Security Team

Linus Lai

Vice President

Jaclynn Anderson

Research Director, Cybersecurity

Sophia Wang

Senior Research Analyst

Austin Zhao

Senior Research Manager

Christopher Kissel

Research Vice President, Security & Trust Products

Hoang Nguyen

Group Vice President, Worldwide Tracker Program

Jay Bretzmann

Research Vice President, Security Products

Pete Finalle

Research Manager, Security & Trust

Ryan O’Leary

Research Director, Privacy and Legal Technology

Frank Dickson

Group Vice President, Security & Trust

Mike Jude

Research Director, Endpoint Security

Simon Piff

Research Vice President

Grace Trinidad

Research Director, Future of Trust

Scott Tiazkun

Research Manager, Security Services

Michelle Abraham

Research Director, Security and Trust

Amy Cravens

Research Manager, Sustainability and ESG Software

Philip Bues

Sr. Research Manager, Cloud Security

Monika Soltysik

Senior Research Analyst, Security & Trust Products

Jennifer Glenn

Research Director

New Research


  • By:  Michelle Abraham Loading

    This IDC Market Analysis Perspective (MAP) delivers a concise current state view of the SIEM and exposure management software market alongside AI-related technologies. The MAP includes market trends, the competitive landscape, buyer trends ...
  • By: 

    • Christopher Rodriguez Loading
    • Pete Finalle Loading
    This IDC Survey Spotlight examines current enterprise and small business perspectives regarding the key security practices for managing SaaS risk. SaaS offers an extremely simplified means for attaining new features and functionality withou...
  • By:  Ryan O’Leary Loading

    This IDC Market Analysis Perspective (MAP) provides a view of the worldwide data privacy compliance software market. It is designed to summarize key trends driving the industry and provide clients with an opportunity to engage with IDC anal...
  • By:  Mike Jude Loading

    This IDC Survey Spotlight indicates that the rationale for acquiring and implementing physical security technology is shifting away from safety and security to a more business-centric focus. This IDC Survey Spotlight illustrates how the foc...
  • By: 

    • Pete Finalle Loading
    • Christopher Rodriguez Loading
    This IDC Survey Spotlight highlights the results of IDC's recent Cybersecurity Capabilities Assessment Framework (CCAF) Survey. The survey asked 258 respondents about which network security practices are in use across the majority of their ...
  • By:  Ryan O’Leary Loading

    This IDC Tech Buyer Presentation discusses the privacy and trust impacts of generative AI. This presentation discusses what steps businesses should take to protect themselves.
  • By: 

    • Pete Finalle Loading
    • Christopher Rodriguez Loading
    This IDC study provides market shares for the leading competitors in the worldwide trusted access and network security market."While network security hardware continues to comprise the lion's share of revenue in the trusted access and netwo...
  • By:  Mike Jude Loading

    This IDC study provides a broad-brush estimation of the physical security technology market size and provides a basis for estimating market growth. It includes software, hardware, and services as well as the key storage and control componen...
  • By:  Amy Cravens Loading

    This IDC TechBrief provides an overview of carbon accounting software, the business benefits of investing in technology, and providers in this market."Carbon reporting has been much in the news over the past several years, with organization...
  • By: 

    • Pete Finalle Loading
    • Christopher Rodriguez Loading
    This IDC Survey Spotlight highlights the results of IDC's recent Cybersecurity Capabilities Assessment Framework (CCAF) Survey, which asked 258 respondents about which network security technologies are in use across the majority of their or...

  • «First | ‹Previous | 411 to 420 of 644 results | Next› | Last»