Cover Image


IDC Study: U.S. Private Sector Cybersecurity Best Practices

出版商 IDC 商品編碼 348600
出版日期 內容資訊 英文 16 Pages
Back to Top
IDC調查:美國民間部門的網路安全的最佳業務實踐 IDC Study: U.S. Private Sector Cybersecurity Best Practices
出版日期: 2016年01月07日 內容資訊: 英文 16 Pages








  • 調查結果
    • 網路安全的最佳 (與最差) 的組織
    • IT安全整體性觀點
    • 企業使用的標準
    • 網路侵入
    • 對非常突出的侵害的反應
    • 內部的威脅
    • 保持安全、成本、業務的混亂的平衡
    • 有許多網路基地台的企業
    • 標準化 vs. 異質性
    • 來自網路邊緣的存取
    • 使用網路安全用分析
    • 科學搜查
    • 實踐與工具的放棄
    • 對實際侵害的應對




  • 相關調查
  • 摘要
Product Code: US40688815

This IDC study on the cybersecurity practices of U.S. businesses reveals a wide spectrum of attitudes and approaches to the growing challenge of keeping corporate data safe. While the minority of cybersecurity "best practitioners" set an admirable example, the study findings indicate that most U.S. companies today are underprepared to deal effectively with potential security breaches from outside or inside their firewalls. There was a frequently cited belief among the interviewed firms that they would inevitably be breached; yet many of the firms seemed content to wait until then to focus harder on cybersecurity.

"The study findings imply that the U.S. private sector is more exposed to cybersecurity threats than it needs to be, given the best practices that are available today," said Steve Conway, IDC research vice president, High Performance Data Analysis. "IDC believes that this situation will improve substantially only in response to more pervasive, serious breaches - and breaches will become more frequent and damaging during the next 10 years.""The benefits of analytics, coupled with 3rd Platform delivery channels, will cause the rapid maturation of analytics platforms and further development of hybrid solution/managed security services (MSS)," said Sean Pike, IDC program director, eDiscovery and Information Governance. "As use cases for analytics platforms mature and competition creates price pressure, organizations will likely continue to turn toward these solutions in order to round out existing security resources."

IDC Opinion

In This Study

Situation Overview

  • Study Findings
    • Best (and Worst) Cybersecurity Practitioners
    • Overarching Philosophies on IT Security
    • Metrics Used by Companies
    • Network Intrusions
    • Reactions to Highly Visible Breaches
    • Internal Threats
    • Balancing Security, Costs, and Business Disruption
    • Firms with Many Access Points
    • Standardization Versus Heterogeneity
    • Access from Network Edges
    • Use of Analytics for Cybersecurity
    • Forensics
    • Abandoned Practices and Tools
    • Responses to Actual Breaches

Future Outlook

Essential Guidance

Learn More

  • Related Research
  • Synopsis
Back to Top