skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Introduction

This Trends to Watch report looks at how in 2017 the IT security market will continue to evolve to meet a new and ever-changing range of cybersecurity threats.

Highlights

  • 2017 is the year Ovum expects next-generation security providers to step to the plate. The time is right, and the requirement for better and more inclusive security facilities and services already exists. All that is needed is the ability to deliver.

Features and Benefits

  • Understand how identity underpins all business relationships, its future role, and the approaches to its use.
  • Understanding why cyber threats cannot be allowed to interrupt the adoption of digital services.

Key questions answered

  • How can organizations safeguard their operations and secure the organization’s reputation and trust?
  • How can security intelligence systems deliver on their promise to protect critical business systems and infrastructure?

Table of contents

Summary

  • Catalyst
  • Ovum view
  • Key messages

Recommendations

  • Recommendations for enterprises
  • Recommendations for vendors

Business trends and technology enablers

  • Security needs to operate at the heart of all business systems

Security intelligence must deliver on its promise to protect critical business systems and infrastructure

  • Threat intel should deliver relevance as well as information
  • Targeted and prioritized information is needed

Next-generation protection systems need to safeguard an organization’s reputation and trust

  • The threat landscape is changing
  • The corporate workplace is now anywhere on any device
  • Cloud usage now requires policing

Identity underpins all business relationships and the delivery of services on all types of platform

  • B2E, B2B, and B2C are all requirements
  • The cloud is the future of IAM
  • Beyond customers are things

Cyber threats must not be allowed to interrupt the adoption of digital services

  • Cybersecurity protection must be in place to deal with the latest threats
  • Change and the use of new technology has to be supported

Appendix

  • Further reading
  • Author

Recommended Articles

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700


Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

Email us at ClientServices@ovum.com

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 788 597 5160 or email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now