市場調查報告書

Chromebook對終端安全市場的影響

Chromebook's Impact on the Endpoint Security Market Not to Be Dismissed

出版商 IDC 商品編碼 917163
出版日期 內容資訊 英文 12 Pages
訂單完成後即時交付
價格
Back to Top
Chromebook對終端安全市場的影響 Chromebook's Impact on the Endpoint Security Market Not to Be Dismissed
出版日期: 2019年11月18日內容資訊: 英文 12 Pages
簡介

隨著雲端運算的普及,企業方面的運算設備和應用的選擇也正逐漸轉移到「雲端中心型」。Google是該變化的最前線企業,採用了使用Chrome OS的全面的安全方法,構築比雲端主體安全的環境。對傳統 (安裝式)的終端安全供應商來說,這樣的動向是動搖經營基礎的事態,需要立即採取對策。

本報告提供Chromebook對全球終端安全市場的影響,Chromebook市場趨勢預測,及安全方面的主要功能,現有的終端安全供應商今後應採取對策等資訊彙整,為您概述為以下內容。

摘要整理

市場新的趨勢和動態

  • Chrome OS設備銷售台數的增加
  • 加入Chromebook的安全功能
    • 削減攻擊面
    • 爆炸半徑的最小化
    • 縮小漏洞濫用的機會
    • 使終端用戶免受Web為基礎的威脅

對終端安全供應商的建議

參考資料

  • 相關調查
  • 摘要
目錄
Product Code: US45637419

This IDC Market Perspective details clear signals of the disruptive impact Chromebooks will have on the endpoint security market. Choice in personal computing devices is expanding in parallel with the cloud era. With more compute and storage hosted in cloud environments than on user devices, a growing number of organizations are realizing the benefits of rewriting their end-user device and security strategies from a cloud-centric perspective. Google is on the forefront in delivering built-secure end-user devices with a complementary secure browser for cloud-centric organizations. IDC further contends that Google's holistic security approach spanning Chrome OS and Chrome browser will accelerate organizations' transformation to cloud centricity."For traditional overlay endpoint security vendors, their market potential is at risk unless they evolve," states Michael Suby, research VP, Security and Trust. Suby cautions, "Endpoint security vendors that fail to recalibrate their product strategies for this cloud-centric dynamic face a less certain future."

Executive Snapshot

New Market Developments and Dynamics

  • Increasing Sales of Chrome OS Devices
  • Chromebook Built-In Security Features
    • Shrink the Attack Surface
    • Minimize the Blast Radius
    • Shorten the Window of Opportunity to Exploit Vulnerabilities
    • Insulate End Users from Web-Based Threats

Advice for the Endpoint Security Vendors

Learn More

  • Related Research
  • Synopsis
Back to Top