Security Team
New Research
This IDC Survey seeks to help shape the cloud journey narrative anchored by the key analysis and findings of IDC's Cloud Security practice and explores purchasing, platforms, threats, breaches, cyberinsurance, and the board. The study findi...
Legalweek continues to be a must attend show for those looking to take stock of the legal technology industry and make deals. It may not be a must "exhibit" show as the show floor has not changed much in the last few years and the attendanc...
On Tuesday, March 28, 2023, Microsoft announced Microsoft Security Copilot available to private, preferred customers. Security Copilot is an assistive product used to aid and support security analysts in their investigations. Unified threat...
IDC创新者是指年营业额低于1亿美元、有创新性技术或突破性商业模式的新兴厂商。本次IDC创新者研究对北京华云安信息技术有限公司、深圳市魔方安全科技有限公司、广州天懋信息系统股份有限公司、上海斗象信息科技有限公司、北京零零信安科技有限公司的攻击面管理创新技术及市场应用进行了全面调研。“企业IT环境复杂性的增加使得企业数字化资产的网络暴露面不断扩大,企业网络安全管理难度持续增加。为了有效应对这一挑战,攻击面管理(ASM)技术迅速成为市场热点。ASM从攻击者视角持续发现和管理企业网...
Almost two years to the day after TPG Capital announced the intended merger of Centrify and Thycotic, Delinea (new brand) revealed a cloud-native identity platform to extend PAM coverage to all users in an enterprise on March 14, 2023. The ...
This IDC Market Glance provides a visual overview of the current vendors in the SIEM and vulnerability management markets. The vulnerability management segment includes the subcategories of application vulnerability management, device vulne...
Eagle Eye Networks announced the release of three new product improvements ahead of the ISC WEST 2023 conference (March 28–31, Las Vegas, Nevada). These enhancements and new products will greatly simplify the migration of video management s...
In this IDC Market Perspective, we look at two of the most common use cases in which the demand is increasing for what companies are looking for in threat intelligence platform (TIP) or threat intelligence security service (TISS): dark web ...
This IDC Perspective looks at engendering trust with proactive cybersecurity using continuous risk-based posture assessment. Proactive cybersecurity moves beyond vulnerability management to consider all risk exposures, not just those that h...
This report is part 2 of 2 of a series examining Asia/Pacific’s (including Japan) (APJ) state of digital business transformation. It drills down into the expanded definition of the business value, new success metrics, and technology investm...
«First | ‹Previous | 571 to 580 of 642 results | Next› | Last»