Advanced Search

Save Or Share This Report

For CIO Professionals

The State Of Enterprise IT Security And Emerging Trends: 2009 To 2010

Business Data Services North America And Europe

January 25, 2010

Authors

  • By Jonathan Penn
  • with Heidi Shey,
  • Ellen Daley,
  • Edward Radcliffe

Why Read This Report

IT security investment has been faring relatively well through the economic downturn, and budgets appear to be strengthening, most notably in the area of new product purchases. Data security and network security top the technology areas of investment and attention, and application security continues to show signs of maturing in terms of enterprise practices as well as adoption of tools and services. Meanwhile, interest in and adoption of managed security services continues to grow across a broad array of areas, driven more by the improved protection it offers rather than a pure operational cost-savings argument. IT security groups continue to grapple with changing IT infrastructure and evolving business demands — yet, while cloud computing gets a lot of media attention, consumerization of IT registers the highest level of concern by IT security decision-makers. This document gives highlights of an extensive data set collected across North American and European enterprises via our Enterprise And SMB IT Security Survey, North America And Europe, Q3 2009.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Timely and relevant, Forrester's RoleView research aligns to 13 leadership roles across business and technology management. Our expertise in customer experience, mobile, digital business, and big data will help your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($2495 USD).

Purchase

Table of Contents

  • North American And European Enterprise IT Security Outlook For 2010
  • IT Security Spending Plans
  • Priorities, Challenges, And Concerns
  • Managed Security Services
  • Compliance
  • Identity And Access Management
  • Client And Application Security
  • Data Security
  • About This Document
  • Basic Segmentation Available
  • Data Available In This Survey
  • Supplemental Material

Recommended Research