Companies have a process for assessing the cybersecurity practices of third-party partners. 51 % of IT decision-makers plan to invest / increase security investment in the next 12 months. 83 % of companies with high-performing security practices collaborate with others to deepen their knowledge of security and threat trends.
Companies have a process for assessing the cybersecurity practices of third-party partners. 51 % of IT decision-makers plan to invest / increase security investment in the next 12 months. 83 % of companies with high-performing security practices collaborate with others to deepen their knowledge of security and threat trends.
Companies have a process for assessing the cybersecurity practices of third-party partners. 51 % of IT decision-makers plan to invest / increase security investment in the next 12 months. 83 % of companies with high-performing security practices collaborate with others to deepen their knowledge of security and threat trends.
Enforcing Security Policy Advanced Persistent Threats of companies have a process for assessing the cybersecurity practices of third-party partners. 1 TOP INVESTMENTS #1 GOAL DRIVING SECURITY INVESTMENTS #3 GOAL DRIVING SECURITY INVESTMENTS #2 GOAL DRIVING SECURITY INVESTMENTS ENTERPRISE SMB 41 % Only of organizations do not have a plan for responding to insider threats. 1 51 % of IT decision-makers plan to invest/increase security investment in the next 12 months 89 % of IT decision-makers feel that security is a critical/very important IT investment 84 % of IT decision-makers believe that security will be impacted by the Internet of Things over the next 12 months. 73 % of companies with high-performing security practices collaborate with others to deepen their knowledge of security and threat trends. 1 82 % 53% Anti-Malware 44% Firewalls TOP INVESTMENTS ENTERPRISE SMB 42% Firewalls 44% Identity Management TOP INVESTMENTS ENTERPRISE & SMB 38% Intrusion Detection and Protection STILL CURIOUS ABOUT SECURITY? IT Decision-Makers are Investing in an Average of 6 Security Solutions How IT Decision-Makers Navigate through Security Objectives and Obstacles Sources: 2014 Navigating IT: Objectives and Obstacles / 2014 US State of Cybercrime Survey 1 To view the complete research results, download the executive summary or contact your InfoWorld sales executive: infoworldmediakit.com