Increased Internet use, followed by a reaction to a major security breach, were most frequently rated as having a h...
December 3, 2002
Increased Internet use, followed by a reaction to a major security breach, were most frequently rated as having a high impact on company decisions to deploy security measures, a new study from IDC reveals.
The report, based on results from a survey of 883 North American IT and business executives, also indicates that over two-thirds of North American organizations rated Web services as having a high impact on the deployment of security measures.
Web services has been much talked about recently, but remains in the early stages of adoption, so concerns over security are greater than they would be for an established concept, the Framingham, Mass. research firm says. “Applications that are exposed to a Web services environment are customer- facing and/or business critical applications and there must be assurance that these remain secure and protected.’
Elsewhere, government regulations that relate to security and privacy continue to be of particular concern to the banking and the healthcare services industries.
IDC’s research shows that even with slow growth, security concerns are prompting organizations to increase IT spending dedicated to security issues. As a result, security spending is gaining share from the total IT budget and/or contributing to increased IT budgets in 2003.
“Despite the economic environment, the prospects for security technologies are optimistic,” said Lucie Draper, program manager of enterprise technology trends research at IDC. “Financial losses are virtually certain if there are failing security standards, so it makes sense for companies to maximize their opportunity and not wait until the market rebounds to procure these technologies. In this way, companies can build efficiencies before the market fully recovers and put the key components in place to take full advantage of the market upswing.”
Security technologies examined in this report include anti-virus tools, hardware-based firewall technologies, security management applications, intrusion detection, encryption, hardware- and software-based tokens, and client and server certificates.
For further information, e-mail firstname.lastname@example.org.