Enterprise IT Security

More from:

Enterprises worldwide are moving infrastructure into the cloud and rebuilding data centers to obtain the necessary scale and agility to operate their businesses. Yet the pace of cyberattacks is unrelenting, with hackers churning out unprecedented volumes of malware and launching massive distributed DoS attacks aimed directly at enterprises or their service providers. These dangers make IT security a key issue impacting enterprise IT.

Minimize the pitfalls and risks with our in-depth coverage of threat mitigation technologies used by enterprises to protect networks, data centers, the cloud, mobile devices and the IoT.
Insights

Analyst Insights View All (26)

  • Jeff Wilson | March 25, 2020
    Coronavirus (COVID-19) is a global issue that is already having a widespread impact on nearly everyone on the planet. The situation is very fluid; anyone who thinks they know exactly what is going to happen is kidding themselves. However, as we have been tracking several fundamental security markets going back to 1997, I was able to go back to two disruptive events during that time—the dot-com bubble burst of 2001 and the global financial crisis of 2008—to provide some guidance on how the cybersecurity technology market will respond to the current crisis. I reviewed the pre-crash forecasts and the actual results for key security technologies like firewalls, IDS/IPS, and web and mail security to help guide my initial adjustments to my current forecasts. Clients, please log in to read the full content.
    Subscribers Only
  • Jeff Wilson, Tanner Johnson | March 10, 2020
    RSA Conference 2020 took place in San Francisco at the end of February. This is the first event that analysts have attended as Omdia, the newly launched research brand of Informa Tech, combining market-leading analyst houses Ovum, IHS Markit TMT research, Tractica, and Heavy Reading.
  • Tanner Johnson | October 22, 2019
    IHS Markit conducted a comprehensive and independent study, commissioned by Trend Micro, focused on a dozen organizations that disclose information security vulnerabilities and cross-referenced the data published from these vendors against information security vulnerabilities made publicly available through various government agencies.

Services

Subscription Services

Understand cyber threat mitigation technologies used to protect networks, data centers, the cloud, mobile devices and the IoT. This service delivers global, in-depth coverage of threat mitigation technologies used by enterprises and service providers to protect networks, data centers, the cloud, mobile devices and the Internet of Things (IoT).
Identify growth opportunities in the market for protecting IoT devices and their data. This service provides complete coverage of IoT cybersecurity products and services, with detailed analysis based on revenue splits from market contributors. The comprehensive market is segmented by domain, technology, region, and vertical.

Reports

Reports View All (35)


Data

Data View All (8)

  • Jeff Wilson | March 23, 2020
    The Threat Mitigation Products Market Database is a data-only market tracker, providing a total view of the cybersecurity technology market by combining the data from multiple security market trackers into one database.
    Subscribers Only
  • Jeff Wilson | March 17, 2020
    This market tracker provides accurate data and analyses including market size, vendor market share, forecasts, and market trends to help clients make better business decisions in the network security appliances and software market.
    Subscribers Only
  • Jeff Wilson | March 10, 2020
    This market tracker provides accurate data and analyses—including market size, vendor market share, forecasts, and market trends—to help clients make better business decisions in the content security gateway appliances, software, and SaaS market.
    Subscribers Only

Presentations

Presentations View All (1)


Press Releases

Press Releases View All (12)


Analysts View All (3)

  • Icon Research Director and Advisor, Cybersecurity Technology
    With more than 18 years in the data networking and telecom industry and one of the most accurate forecast track records in the business, Jeff is a certifiable network security market guru. He has expertise in a wide variety of network security appliance, software, and services markets.
  • Icon Senior Analyst, Connectivity & IoT
    Tanner Johnson is a cybersecurity analyst focused on IoT and transformative technologies at IHS Markit. His coverage is focused on examining the various threats that occupy the IoT technology domain, as well as opportunities and strategies that are emerging as data connectivity continues to expand.
  • Icon Research Director-Consulting & Financial Services, Technology Media & Telecom
    William Kidd is a Technology, Media & Telecom (TMT) research director at IHS Markit.
Share facebook Twitter Google Plus Linked In Add This Contact Us