skip to main content
Close Icon

In order to deliver a personalized, responsive service and to improve the site, we remember and store information about how you use it. This is done using simple text files called cookies which sit on your computer. By continuing to use this site and access its features, you are consenting to our use of cookies. To find out more about the way Informa uses cookies please go to our Cookie Policy page.

Global Search Configuration

Introduction

This Trends to Watch report looks at how in 2017 the IT security market will continue to evolve to meet a new and ever-changing range of cybersecurity threats.

Highlights

  • 2017 is the year Ovum expects next-generation security providers to step to the plate. The time is right, and the requirement for better and more inclusive security facilities and services already exists. All that is needed is the ability to deliver.

Features and Benefits

  • Understand how identity underpins all business relationships, its future role, and the approaches to its use.
  • Understanding why cyber threats cannot be allowed to interrupt the adoption of digital services.

Key questions answered

  • How can organizations safeguard their operations and secure the organization’s reputation and trust?
  • How can security intelligence systems deliver on their promise to protect critical business systems and infrastructure?

Table of contents

Summary

  • Catalyst
  • Ovum view
  • Key messages

Recommendations

  • Recommendations for enterprises
  • Recommendations for vendors

Business trends and technology enablers

  • Security needs to operate at the heart of all business systems

Security intelligence must deliver on its promise to protect critical business systems and infrastructure

  • Threat intel should deliver relevance as well as information
  • Targeted and prioritized information is needed

Next-generation protection systems need to safeguard an organization’s reputation and trust

  • The threat landscape is changing
  • The corporate workplace is now anywhere on any device
  • Cloud usage now requires policing

Identity underpins all business relationships and the delivery of services on all types of platform

  • B2E, B2B, and B2C are all requirements
  • The cloud is the future of IAM
  • Beyond customers are things

Cyber threats must not be allowed to interrupt the adoption of digital services

  • Cybersecurity protection must be in place to deal with the latest threats
  • Change and the use of new technology has to be supported

Appendix

  • Further reading
  • Author

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700


Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

+44 (0) 207 551 9047 - Operational from 09.00 - 17.00 UK time

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - +44 (0) 207 017 7760 or email us at pr@ovum.com

Contact marketing - marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now