You are on page 1of 1

Detecting/Combating

Protecting Company Data


Enforcing Security Policy
Advanced Persistent Threats
of companies have a
process for assessing
the cybersecurity
practices of
third-party partners.
1
TOP INVESTMENTS
#1 GOAL
DRIVING SECURITY INVESTMENTS
#3 GOAL
DRIVING SECURITY INVESTMENTS
#2 GOAL
DRIVING SECURITY INVESTMENTS
ENTERPRISE SMB
41
%
Only
of organizations
do not have a plan
for responding to
insider threats.
1
51
%
of IT decision-makers
plan to invest/increase
security investment
in the next 12 months
89
%
of IT decision-makers feel that security
is a critical/very important IT investment
84
%
of IT decision-makers
believe that security
will be impacted by
the Internet of Things
over the next
12 months.
73
%
of companies with
high-performing security
practices collaborate with
others to deepen their
knowledge of security
and threat trends.
1
82
%
53%
Anti-Malware
44%
Firewalls
TOP INVESTMENTS
ENTERPRISE SMB
42%
Firewalls
44%
Identity
Management
TOP INVESTMENTS
ENTERPRISE & SMB
38%
Intrusion Detection
and Protection
STILL CURIOUS
ABOUT SECURITY?
IT Decision-Makers are
Investing in an Average of
6 Security Solutions
How IT Decision-Makers Navigate through
Security Objectives and Obstacles
Sources: 2014 Navigating IT: Objectives and Obstacles / 2014 US State of Cybercrime Survey
1
To view the complete research results, download the executive summary
or contact your InfoWorld sales executive: infoworldmediakit.com

You might also like