Key Takeaways What budgetary beasts will IT pros battle in 2016? Here are a few key findings:

Size: px
Start display at page:

Download "Key Takeaways What budgetary beasts will IT pros battle in 2016? Here are a few key findings:"

Transcription

1 Key Takeaways What budgetary beasts will IT pros battle in 2016? Here are a few key findings: Despite rising average annual company revenue, IT budgets remain relatively flat. IT pros don t expect their IT staff to increase in 2016, which means they ll need to keep doing more with less. Security attacks are rising, but budgets aren't. 59% of IT pros say their companies don't invest enough in security. Technology end-of-life (EOL) is expected to strongly influence investment in /23

2 IT Budget Barriers Money makes the world go 'round, especially the world of IT. Unfortunately, IT pros and tech marketers in 2016 will have some fearsome financial foes to face. >> IT budgets remain fairly flat, even though average annual revenue is higher than last year. 2/23

3 Curse of the IT Spend IT budgets... are barely budging over the coming year. Global planned spending is expected to increase by about $2,000 year over year. And while North American IT pros will see a slight lift in their 2016 budgets, the money monsters are after EMEA IT pros they'll have virtually no budget increase next year. "A lot of the time, management's number one priority is the revenue stream. So I show them why if the issue isn't resolved, it will mean a loss of revenue in one way or another." Colton Howard, IT Manager Planned spending on IT hardware, software, and services $350,000 $300,000 $293,094 $291,062 $250,000 $200,000 $150,000 $100,000 $50,000 $0 Total /23

4 Total IT budget expected to change from 2015 to % 42% 10% 11% Increase No change Decrease Don't know Revenue Growing Though IT spending is relatively flat, more than half (56%) of IT pros surveyed expect their company's annual revenue to continue increasing in What's the disconnect? Management is laser-focused on keeping costs low, but doesn't quite get IT's importance to the company... until something breaks. Revenue change from 2015 to % 22% 10% 12% Increase No change Decrease Don't know 4/23

5 Staffing Strained Almost 60% of IT pros surveyed don't expect their IT staff to increase in 2016 (cue the Wilhelm Scream). This means they'll need to continue making IT work... minus the extra hands. Overall expected change in IT staff for % 59% 4% 3% Increase No change Decrease Don't know 5/23

6 Allocation of Budget in 2016 How will IT pros divvy up the dollars? Their top priorities are hardware and software, although spending for hosted/cloud-based and managed service projects is slated to increase slightly over Also, despite the fact that Windows 10 is a free upgrade for most, IT pros still plan to spend some money on hardware as part of their OS rollout. Overall budget allocation 37% 41% 31% 33% 13% 14% 10% 12% 5% 3% Hardware projects Software projects Managed service projects Hosted/cloudbased projects Don't know /23

7 Top hardware investments on average by year (Percentage of hardware budget) 21% 20% 19% 19% 16% 15% 10% 10% 8% 6% 6% 7% Desktops Servers Laptops Networking External storage Tablet/Mobile Surprised that desktops are still in the lead even expected to creep ahead more in 2016? Despite campfire stories of a world without desktops, they aren t going anywhere this year. Still, IT pros predict desktops will eventually be scared off by The Rise of the Mobile Empire. Top software investments on average by year (Percentage of software budget) 17% 16% 15% 15% 15% 14% 11% 10% 10% 10% 10% 9% 9% 8% Virtualization OS Productivity CRM/ERP Backup/DR Database Security /23

8 Top managed services investments on average by year (Percentage of managed services budget) 19% 16% 14% 14% 16% 13% 13% 10% 10% 9% 5% 3% 4% 5% IT services Connectivity / b Hosting Consulting Storage / backu / collabor Communication Cellular Top hosted/cloud-based investments on average by year (Percentage of hosted/cloud-based budget) 18% 16% 13% 10% 8% 7% 6% 5% 4% 4% 4% 4% 5% 6% 4% 2% Web hosting Online backup/recovery Productivity solutions Application hosting Infrastructure Hosted VoIP Sales support (CRM) Content filtering Industry specific apps Purchase Drivers 8/23

9 So what drives IT pros to buy? The numbers don't lie like last year, technology EOL and company growth/additional needs top the list. New tech features are the least compelling, with only a quarter of IT pros citing these as drivers for new tech purchases. This speaks to the motto of many companies: "If it ain't broke, don't fix it." What typically prompts your organization to purchase new hardware, software and/or services? 67% 67% 57% 56% 57% 33% 34% 25% End of life Growth / additi Upgrades / refr End user need Project need Budget availability Software / appli New technology Trending Topics Things that go bump in the server room? Security will be the stuff of techie bad dreams. On the brighter side, it s a big year for OS upgrades. >> What's keeping IT buyers up at night? Security and OSes top the list. 9/23

10 Security: Be Afraid, Be Very Afraid Only half of surveyed IT pros believe their organization's data is adequately protected and consider IT security a top priority for Almost 60% also believe their organization is not adequately investing in IT security. "It's still true that even in a high tech sector, your weakest point is your users. Ensure that all employees are being careful (hire a company full of sysadmins! :D) or TRAIN them to be better." Lisa Lyons, Network/Systems Admin Security perceptions (Percentage of those who selected agree or strongly agree) 74% 59% 62% 48% 51% Our data/it assets aren't adequately protected IT security isn't a top priority for us in 2016 We don't adequately invest in IT security We don't conduct regular security audits Newsworthy breaches haven't led us to change IT security practices 10/23

11 About three-quarters of surveyed IT pros consider their organizations at risk for technology, IT security, and man-made disasters or incidents. IT spend on security hardware, software, and services will remain flat year over year with IT professionals planning to allocate 6% of their total budget to security. Plus, many organizations aren't conducting regular security audits or updating security practices to help protect against worldwide increase in security breaches. In other words, there's still a lot of room for improvement when it comes to securing IT environments from the threats lurking in the shadows, especially as news of hacks haunt the headlines. Disaster risk perceptions (Percentage of those who selected moderate to high risk) 73% 73% 72% 40% 30% Technology disasters/incidents IT security disasters/incidents Man made disasters/incidents Natural disasters/incidents Other disasters/incidents 11/23

12 OS News: Night of the Living Dead OSes Spiceworks' exclusive network stats show that Microsoft Windows 7 is still the most adopted OS, followed by Windows XP a dead OS walking (and not a great one to have around) when it comes to security. Of the most popular OSes, Windows 8 has the lowest penetration rate. So, what's the exact OS usage breakdown we're seeing on the Spiceworks network? Percentage of companies within the Spiceworks network using the following client OSes (as of July 2014 to July 2015) 93% 90% 66% 72% 16% 18% Windows 7 Windows XP Windows Microsoft Windows Server 2003 had its end-of-service in April 2015, so it s not shocking that fewer IT pros are using it. (Though it s still present in 60% of companies.) With that, Spiceworks is seeing a higher network penetration rate for Windows Server 2012/2012 R2 than in the past as predicted. 12/23

13 Percentage of companies within the Spiceworks network using the following server OSes 60% 68% 44% 27% Windows Server 2003 Windows Server 2012/2012 R OS News: Keeping the Boogeymen at Bay According to the survey, the migration trends will continue: IT pros say their top OS initiatives for 2016 are upgrading to Windows 10 and migrating from Windows Server In addition, surveyed IT pros who've allocated budget to OS upgrades do expect to upgrade older hardware during these OS projects. What can we say? It seems IT pros are still buying hardware... even when the OS is free. "We're looking at upgrading our machines to a newer OS. While migrating to Windows 10, we're swapping out the drives on any new build/rebuild to SSDs." Charlie Tank, Network/Sys Admin 13/23

14 Top OS projects IT pros plan to spend budget on (Asked of those planning to allocate 2016 software budget to OS) Windows 10 47% Windows Server 2003 migration 32% SQL Server 2005 migration 12% Top planned hardware purchases as part of an OS project (Asked of those who know what OS projects will get budget) Servers 51% Desktops 51% Laptops 47% Storage 25% Tablets/smartphones 22% 14/23

15 Future of IT Look into our crystal ball as we delve into the popularity of different tech trends, from server virtualization to BYOD to advanced security to [insert almost anything]-as-a-service... So, what lies ahead for IT? >> EOL will be a top reason IT pros make new purchases. (So things will still go cha-ching in the night...) 15/23

16 Not-so-Terrifying IT Tech Trends More than three-quarters of survey respondents currently use server virtualization significantly more than those supporting mobility and BYOD. But only a third are using advanced solutions despite increased security attacks (consider yourself warned!) That said, IT pros are gearing up for a... threatening year. Almost a quarter plan to invest in advanced security in Other predicted areas of high growth? Application virtualization/hosted shared desktop, VDI, and various shapes of cloud such as SaaS, IaaS, and PaaS. Adoption of technology trends Server Virtualization 76% 9% Mobility/BYOD 45% 12% Advanced Security Solutions 34% 21% Software as a Service (SaaS) Application Virtualization/Hosted Shared Desktop Virtual Desktop Infrastructure (VDI) 18% 34% 28% 12% 11% 10% Infrastructure as a Service (IaaS) 11% 5% Platform as a Service (PaaS) Software defined Data Center (SDDC) Desktop as a Service (DaaS) 8% 3% 6% 4% 6% 3% Software defined Network (SDN) 6% 3% Currently use Planning to use 16/23

17 Importance of IT Initiatives to Business Security solutions, while considered pretty important to current business practices, are expected to get top billing in the future. This indicates IT pros may start using more funds to ward off potential security issues. Importance of IT solutions/services to current and future business practices (Percentage of those who selected very to extremely important) Security 73% 78% Networking 72% 70% Storage 63% 62% Software 63% 61% Hardware 59% 57% Virtualization 58% 65% Cloud based or hosted services 29% 43% Training & development 28% 39% Mobility/BYOD 18% 32% Important now Important in the future 17/23

18 IT's Not All Doom & Gloom Company revenues should get a boost in 2016, but IT budgets will remain flat. The good news for tech vendors: IT departments will still be shelling out bucks on IT in the coming year. In fact, OS migrations away from Windows Server 2003 and upgrades to Windows 10 will drive some purchases of new servers and PCs. In addition, with only half of IT departments feeling adequately protected from security threats, IT pros are definitely thinking long and hard about choosing the right security products for their organizations and budgets. For IT departments that can't spend big right now, they'll need to look for ways to spend smart by identifying clever ways to save money while still meeting business needs. In other words, things will still go cha-ching in the night /23

19 Profile Who are these IT pros making up the State of IT? Take a peek... >> From North America (NA) to Europe, the Middle East, and Africa (EMEA), these IT pros span company size, job title, and industry. 19/23

20 Number of survey respondents 41% 59% NA EMEA Top industries represented 13% 11% 10% 8% 7% 7% 5% 5% 4% Manufa IT services Healthcare Education Nonprofit Retail/wholesale Financial Services Government Construction 20/23

21 Company sizes represented 16% 20% 24% 12% 11% 8% 4% 4% 1 19 em employees employees employees employees employees 1,000 2,499 employees 2,500+ employees Top titles represented 34% 29% 12% 7% 6% Network/System Administrator IT Manager IT Director Owner/CEO/Presid Help Desk Technician 21/23

22 About Spiceworks Spiceworks is the professional network that s revolutionizing the IT economy. We provide millions of IT pros with the tools, content, and community they need to get their jobs done. Those users have attracted the attention of thousands of technology brands who use Spiceworks to reach IT professionals during their workday. Together, we ve created the world s most trusted and vibrant IT marketplace. ABOUT SPICEWORKS VOICE OF IT The Spiceworks Voice of IT market insights program publishes statistics, trends, and opinions on the IT industry. We re pioneering a new, fresh approach to IT data by combining rich social insights from the network with one-of-a-kind usage statistics on the technologies that keep businesses running today. More than 620,000 IT professionals in over 100 countries have joined the program to share information and feedback on the tech issues important to them. Follow Spiceworks on Twitter and connect with Spiceworks on Facebook. For more information visit: For other Spiceworks Voice of IT reports visit: This report contains information of fact relating to parties other than Spiceworks. Although the information has been obtained from, and is based on sources that Spiceworks believes to be reliable, Spiceworks does not guarantee the accuracy, and any such information might be incomplete or condensed. Any estimates included in this report constitute Spiceworks judgment as of the date of compilation, and are subject to change without notice. This report is for information purposes only. All responsibility for any interpretations or actions based on the information or commentary contained within this report lie solely with the recipient. All rights reserved /23

23 23/23

State of SMB IT 1H 2012

State of SMB IT 1H 2012 TM Voice of IT State of SMB IT 1H 2012 Semi-Annual Report On Small And Medium Business Technology Plans & Purchase Intent Spiceworks Inc., 7300 FM 2222, Bldg 3, Ste 100, Austin, TX 78730 Tel: 1-512-628-8280

More information

Sales Presentation Case 2018 Dell EMC

Sales Presentation Case 2018 Dell EMC Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations

More information

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return

More information

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+ CompTIA Security Research Study 2007 Trends and Observations on Organizational Security Carol Balkcom, Product Manager, Security+ Goals of this session To share some trends and observations related to

More information

As Enterprise Mobility Usage Escalates, So Does Security Risk

As Enterprise Mobility Usage Escalates, So Does Security Risk YOUR SECURITY. CONNECTED WHITE PAPER As Enterprise Mobility Usage Escalates, So Does Security Risk Even as more organizations embrace the use of mobile devices by employees and customers to access services

More information

2014 IT Priorities Mark Schlack Sr. VP, Editorial

2014 IT Priorities Mark Schlack Sr. VP, Editorial 2014 IT Priorities Mark Schlack Sr. VP, Editorial What s driving IT managers technology decisions TechTarget Highlights Global budget growth in 2014 is ahead of 2013. Virtualization is a pervasive technology

More information

Taking Back Control of Your Network With SD-LAN

Taking Back Control of Your Network With SD-LAN IHS TECHNOLOGY SEPTEMBER 2016 Taking Back Control of Your Network With SD-LAN Matthias Machowinski, Senior Research Director, Enterprise Networks and Video TABLE OF CONTENTS Access Networks Are Under Pressure...

More information

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

MOVING MISSION IT SERVICES TO THE CLOUD

MOVING MISSION IT SERVICES TO THE CLOUD MOVING MISSION IT SERVICES TO THE CLOUD About half of civilian agency IT officials report they are now implementing mission support and business systems in the cloud. But a new progress report also highlights

More information

34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring

34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring WHITEPAPER DOING MORE WITH LESS How shrinks total cost of ownership (TCO) compared to Windows I n a study measuring the TCO of Windows and servers, Red Hat Enterprise platforms exhibited 34% lower annual

More information

As BYOD Becomes Mainstream, Complexity Intensifies

As BYOD Becomes Mainstream, Complexity Intensifies May 2013 As BYOD Becomes Mainstream, Complexity Intensifies A Spiceworks Market Insights Report Sponsored by Fiberlink Companies of all sizes are prepping to support the coming wave of mobile devices,

More information

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket User Survey Analysis: Next Steps for Server Virtualization in the Midmarket Gartner RAS Core Research Note G00207375, James A. Browning, Alan Dayley, 21 October 2010, RV2A411012011 Approximately 30% of

More information

IT Security: Managing a New Reality

IT Security: Managing a New Reality IT Security: Managing a New Reality Kevin Lonergan #IDCDirections IDC You re Only as Strong as Your Weakest Link Locks Only Work if you Know How to Use Them IDC 2 Millions Canadian Security Market Forecast:

More information

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY Perspectives from U.S. and ese IT Professionals Executive Summary The use of artificial intelligence (AI) and machine learning (ML) in cybersecurity

More information

Building a Threat Intelligence Program

Building a Threat Intelligence Program WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351

More information

Gartner Mid Market Trends- Featured at MES #MES17

Gartner Mid Market Trends- Featured at MES #MES17 Gartner Mid Market Trends- Featured at MES #MES17 @ T h e M i d m a r ke t C I O M i d s i ze E n t e r p r i s e S u m m i t MES SPRING April 30 May 2, 2017 Gaylord Opryland Resort Nashville, TN MES FALL

More information

CICS insights from IT professionals revealed

CICS insights from IT professionals revealed CICS insights from IT professionals revealed A CICS survey analysis report from: IBM, CICS, and z/os are registered trademarks of International Business Machines Corporation in the United States, other

More information

Midsize Business Voice Service Spending Steady for 2003

Midsize Business Voice Service Spending Steady for 2003 End-User Analysis Midsize Business Voice Service Spending Steady for 23 Abstract: Telecom service providers need to know the voice telecom spending plans of the margin-rich midsize business segment in

More information

Odin. SMB Cloud InsightsTM GERMANY

Odin. SMB Cloud InsightsTM GERMANY Odin 2015 SMB Cloud InsightsTM GERMANY DEFINITIONS SMB Defined We define SMBs also known as small and medium enterprises (SMEs) as companies with one to 250 employees. There are around 2 million SMBs in

More information

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use

More information

` 2017 CloudEndure 1

` 2017 CloudEndure 1 ` 2017 CloudEndure 1 Table of Contents Executive Summary... 3 Production Machines in the Organization... 4 Production Machines Using Disaster Recovery... 5 Workloads Primarily Covered by Disaster Recovery...

More information

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day

More information

IPv6 Readiness in the Communication Service Provider Industry

IPv6 Readiness in the Communication Service Provider Industry IPv6 Readiness in the Communication Service Provider Industry An Incognito Software Report Published April 2014 Executive Summary... 2 Methodology and Respondent Profile... 3 Methodology... 3 Respondent

More information

Choices when it comes to your communications infrastructure A BUYER S GUIDE TO IP-BASED SOLUTIONS

Choices when it comes to your communications infrastructure A BUYER S GUIDE TO IP-BASED SOLUTIONS Choices when it comes to your communications infrastructure A BUYER S GUIDE TO IP-BASED SOLUTIONS Introduction A small business has many priorities. With so much on your mind, your phone system might be

More information

Five Reasons It s Time For Secure Single Sign-On

Five Reasons It s Time For Secure Single Sign-On Five Reasons It s Time For Secure Single Sign-On From improved security to increased customer engagement, secure single sign-on is a smart choice. Executive Overview While cloud-based applications provide

More information

Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7

Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7 Page 1 of 8 Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7 7 June 2010 Michael A. Silver Gartner RAS Core Research Note G00200542 Respondents to

More information

2017 Windows 10 Enterprise Impact Survey Windows 10 Enterprise Impact Survey

2017 Windows 10 Enterprise Impact Survey Windows 10 Enterprise Impact Survey 2017 Windows 10 Enterprise Impact Survey 2017 Windows 10 Enterprise Impact Survey 2017 Windows 10 Enterprise Impact Survey Executive Summary This report illuminates IT trends and other key findings uncovered

More information

THE STATE OF CLOUD & DATA PROTECTION 2018

THE STATE OF CLOUD & DATA PROTECTION 2018 THE STATE OF CLOUD & DATA PROTECTION 2018 Survey Results: 10 Findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption. INTRODUCTION The Unitrends 2018 annual survey of IT professionals

More information

ACHIEVING FIFTH GENERATION CYBER SECURITY

ACHIEVING FIFTH GENERATION CYBER SECURITY ACHIEVING FIFTH GENERATION CYBER SECURITY A Survey Research Report of IT and Security Professionals MARCH 2018 INTRODUCTION The pursuit of the highest level of cyber security is a top priority for IT and

More information

STATE OF THE NETWORK STUDY

STATE OF THE NETWORK STUDY 10TH ANNUAL STUDY 2017 1 EXECUTIVE SUMMARY The Tenth Annual State of the Network Global Study focuses a lens on the network team s role in security investigations. Results indicate that 88 percent of network

More information

E-Guide Server hardware purchasing considerations

E-Guide Server hardware purchasing considerations E-Guide Server hardware purchasing considerations Servers are expensive. When you re tasked with making a purchase of this size, you want to be sure you ve made the right choice especially as servers tend

More information

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on

More information

TREND REPORT. Ethernet, MPLS and SD-WAN: What Decision Makers Really Think

TREND REPORT. Ethernet, MPLS and SD-WAN: What Decision Makers Really Think TREND REPORT Ethernet, MPLS and SD-WAN: What Decision Makers Really Think TABLE OF CONTENTS Introduction 3 CH. 1 What IT Pros Think of Ethernet 4 CH. 2 What IT Pros Think of MPLS 8 CH. 3 What IT Pros Think

More information

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

DaaS Market Report Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective

DaaS Market Report Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective DaaS Market Report 2017 2017 Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective Survey shows jump in traditional Value Added Resellers (VARs) embracing

More information

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the

More information

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%

More information

Operationalize Security To Secure Your Data Perimeter

Operationalize Security To Secure Your Data Perimeter Operationalize Security To Secure Your Data Perimeter GET STARTED Protecting Your Data Without Sacrificing Business Agility Every day, companies generate mountains of data that are critical to their business.

More information

Cybersecurity 2016 Survey Summary Report of Survey Results

Cybersecurity 2016 Survey Summary Report of Survey Results Introduction In 2016, the International City/County Management Association (ICMA), in partnership with the University of Maryland, Baltimore County (UMBC), conducted a survey to better understand local

More information

Don t Get Left Behind

Don t Get Left Behind August 2015 Executive Summary Cloud adoption is growing, but relatively few organizations have advanced cloud strategies Achieving greater levels of cloud adoption allows organizations to materially improve

More information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: October Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of managed environments,

More information

The Problem with Privileged Users

The Problem with Privileged Users Flash Point Paper Enforce Access Control The Problem with Privileged Users Four Steps to Reducing Breach Risk: What You Don t Know CAN Hurt You Today s users need easy anytime, anywhere access to information

More information

SECOND ANNUAL. Small & Medium Business Trends Report Research insights from nearly 500 business owners and leaders

SECOND ANNUAL. Small & Medium Business Trends Report Research insights from nearly 500 business owners and leaders SECOND ANNUAL Small & Medium Business Trends Report Research insights from nearly 500 business owners and leaders Introduction Welcome to the second annual Small & Medium Business Trends Report. Small

More information

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016 All Are Trying, Some Are Benefiting; Few Are Maximizing Value September 2016 Executive Summary Cloud adoption has increased 61% from last year, with 73% pursuing a hybrid cloud strategy and on-premises

More information

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity How NSFOCUS Protected the G20 Summit Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity SPONSORED BY Rosefelt is responsible for developing NSFOCUS threat intelligence and web

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

The future of UC&C on mobile

The future of UC&C on mobile SURVEY REPORT The future of UC&C on mobile Published by 2018 Introduction The future of UC&C on mobile report gives us insight into how operators and manufacturers around the world rate their unified communication

More information

Availability in the Modern Datacenter

Availability in the Modern Datacenter Availability in the Modern Datacenter Adriana Rangel SIS Research Director IDC Middle East, Turkey & Africa IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 US$ Mn Middle East IT Market Spending

More information

TechValidate Survey Report: SaaS Application Trends and Challenges

TechValidate Survey Report: SaaS Application Trends and Challenges TechValidate Survey Report: SaaS Application Trends and Challenges TechValidate Survey Report: SaaS Application Trends and Challenges 2 The current growth rates and investments in SaaS are astounding.

More information

Executive Summary...1

Executive Summary...1 Table of Contents Executive Summary...1...2 Key Findings in the Cloud...2 Growth Opportunities Overview...3 Hosted Infrastructure...4 Web Presence...6 Hosted Communication and Collaboration...9 Hosted

More information

A guide for assembling your Jira Data Center team

A guide for assembling your Jira Data Center team A guide for assembling your Jira Data Center team Contents 01 Getting started 02 Helpful roles for your Jira Data Center team 03 Helpful expertise for your Jira Data Center team 04 Pro tips & best practices

More information

2015 VORMETRIC INSIDER THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:

More information

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more - Samsung Tablet Photo - Tablets Mean Business Survey of IT pros reflects growing trend toward tablets for workforce mobility and more Table of contents Introduction 2 Giving employees what they want pays

More information

State of the Cyber Training Market January 2018

State of the Cyber Training Market January 2018 State of the Cyber Training Market January 2018 2018 by CYBERBIT 2018 by CYBERBIT Proprietary CYBERBIT Proprietary Cybersecurity Market Worth 202.36 Billion USD by 2021 Marketandmarkets analysis, 2017

More information

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions ENABLING SECURE CLOUD CONNECTIVITY Create a Successful Cloud Strategy with Reliable Connectivity Solutions TABLE OF CONTENTS Introduction The Data Storage Conundrum Cloud vs. On-premises: Finding the Right

More information

Multicloud is the New Normal Cloud enables Digital Transformation (DX), but more clouds bring more challenges

Multicloud is the New Normal Cloud enables Digital Transformation (DX), but more clouds bring more challenges Multicloud is the New Normal Cloud enables Digital Transformation (DX), but more clouds bring more challenges An IDC InfoBrief, Sponsored by Cisco March 2018 EXECUTIVE SUMMARY Cloud is a key enabler of

More information

Todd Sander Vice President, Research e.republic Inc.

Todd Sander Vice President, Research e.republic Inc. Todd Sander Vice President, Research e.republic Inc. Tsander@erepublic.com Report Background Respondent Type Breakdown Received responses from 74 state elected and appointed officials and 29 staff members

More information

IT Decision Makers Unplugged

IT Decision Makers Unplugged IT Decision Makers Unplugged Find out what IT Pros want to hear from small and emerging tech companies Jon Brown, Vice President, Market Intelligence #TTGTSummit www.techtarget.com/formarketers TechTarget

More information

RAIFFEISENBANK BULGARIA

RAIFFEISENBANK BULGARIA RAIFFEISENBANK BULGARIA IT thought leader chooses EMC XtremIO and VMware for groundbreaking VDI project OVERVIEW ESSENTIALS Industry Financial services Company Size Over 3,000 employees, assets of approximately

More information

2017 THALES DATA THREAT REPORT

2017 THALES DATA THREAT REPORT 2017 THALES DATA THREAT REPORT Trends in Encryption and Data Security FINANCIAL SERVICES EDITION www.thales-esecurity.com 2017 THALES DATA THREAT REPORT TRENDS IN ENCRYPTION AND DATA PROTECTION U.S. U.K.

More information

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT:

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION April 2014 Sponsored by: 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT:

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

DBMS Software Market Forecast, (Executive Summary) Executive Summary

DBMS Software Market Forecast, (Executive Summary) Executive Summary DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:

More information

THREE COLOCATION MYTHS HEALTHCARE PROVIDERS SHOULD LEAVE BEHIND. Exploring Security, Compliance, and Performance in Healthcare IT

THREE COLOCATION MYTHS HEALTHCARE PROVIDERS SHOULD LEAVE BEHIND. Exploring Security, Compliance, and Performance in Healthcare IT THREE COLOCATION MYTHS HEALTHCARE PROVIDERS SHOULD LEAVE BEHIND Exploring Security, Compliance, and Performance in Healthcare IT According to a recent Spiceworks survey of IT professionals working in the

More information

Digital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience

Digital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience Persona name Amanda Industry, geographic or other segments B2B Roles Digital Marketing Manager, Marketing Manager, Agency Owner Reports to VP Marketing or Agency Owner Education Bachelors in Marketing,

More information

MACRO ECONOMIC LANDSCAPE & TECHNOLOGY WORLD

MACRO ECONOMIC LANDSCAPE & TECHNOLOGY WORLD MACRO ECONOMIC LANDSCAPE & TECHNOLOGY WORLD Asia in an international comparison Matthias Hartmann, CEO GfK SE June 2015 1 World Economy & Growth Challenges 2 Slight acceleration in global economic growth:

More information

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value All Are Trying, Some Are Benefiting; Few Are Maximizing Value Latin America Findings September 2016 Executive Summary Cloud adoption has increased 49% from last year, with 78% of companies in Latin America

More information

Digital Transformation Drives Distributed Store Networks To The Breaking Point

Digital Transformation Drives Distributed Store Networks To The Breaking Point Digital Transformation Drives Distributed Store Networks To The GET STARTED Overview Forward-looking retailers are realizing the value of cloud- and data center-based applications as they move high-priority

More information

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology

More information

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) MOBILE SECURITY Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) INTRODUCTION BYOD SECURITY 2014 It s no surprise that there are many articles and papers on Bring Your

More information

2010 Web Analytics Progress and Plans in BtoB Organizations: Survey Report

2010 Web Analytics Progress and Plans in BtoB Organizations: Survey Report 2010 Web Analytics Progress and Plans in BtoB Organizations: Survey Report page 1 Web Analytics Association 2010 Web Analytics Progress and Plans in BtoB Organizations: Survey Report Prepared by the Web

More information

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1 COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1 Worldwide Infrastructure Security Report Highlights Volume XIII C F Chui, Principal Security Technologist COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 2 Overview This presentation

More information

There s No Reason Not to Localize State of Localization Benchmark Survey

There s No Reason Not to Localize State of Localization Benchmark Survey There s No Reason Not to Localize State of Localization Benchmark Survey Transifex 2014 Click me TM Localization Benchmark Study 2014 The concept of localization is becoming more important as we all become

More information

COLUMBUS. Business Solutions. Cloud Unified Communications & Interoperability. Javier Pereira Director of Product Development November 2011

COLUMBUS. Business Solutions. Cloud Unified Communications & Interoperability. Javier Pereira Director of Product Development November 2011 COLUMBUS Business Solutions Cloud Unified Communications & Interoperability Javier Pereira Director of Product Development November 2011 Industry Tendencies Gartner Reported that the second priority for

More information

BACKUP TO THE FUTURE A SPICEWORKS SURVEY

BACKUP TO THE FUTURE A SPICEWORKS SURVEY BACKUP TO THE FUTURE A SPICEWORKS SURVEY 02 BACKUP TO THE FUTURE A SPICEWORKS SURVEY METHODOLOGY This research study was conducted by Spiceworks, the professional network for the IT industry, from a survey

More information

Abstract: Data Protection Cloud Strategies

Abstract: Data Protection Cloud Strategies Enterprise Strategy Group Getting to the bigger truth. Research Report Abstract: Data Protection Cloud Strategies Considerations for Organizations Seeking to Utilize Cloud Services as Part of Their Data

More information

Exploring Cloud. Is moving your phone system to the cloud right for your business?

Exploring Cloud. Is moving your phone system to the cloud right for your business? Exploring Cloud Is moving your phone system to the cloud right for your business? So You re Thinking about Moving Your Phone System to the Cloud. That s great! A cloud phone system gives you access to

More information

Technology Priorities SURVEY. Exclusive Research from CIO magazine

Technology Priorities SURVEY. Exclusive Research from CIO magazine Technology Priorities SURVEY Exclusive Research from CIO magazine JULY 2010 EXECUTIVE SUMMARY Top Technology Priorities for CIOs: Cloud Computing, Virtualization Desktop and network virtualization, along

More information

Converged Infrastructure Matures And Proves Its Value

Converged Infrastructure Matures And Proves Its Value A Custom Technology Adoption Profile Commissioned By Hewlett-Packard May 2013 Introduction Converged infrastructure (CI) solutions have been widely adopted by a range of enterprises, and they offer significant

More information

Roadmap to the Efficient Cloud: 3 Checkpoints for the Modern Enterprise

Roadmap to the Efficient Cloud: 3 Checkpoints for the Modern Enterprise Roadmap to the Efficient Cloud: 3 Checkpoints for the Modern Enterprise Roadmap for the Modern Enterprise As your AWS environment grows, the importance of instilling governance and following best practice

More information

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive

More information

Market Trends in Public Cloud Storage

Market Trends in Public Cloud Storage Market Trends in Public Cloud Storage Deepak Mohan, Research Director, Public Cloud Infrastructure as a Service Andrew Smith, Sr. Research Analyst, Storage Software IDC Web Conference 12 September 2017

More information

Walk a mile in their shoes

Walk a mile in their shoes Walk a mile in their shoes Insight from IT pros on what they expect from Midsize and Enterprise marketers to meet their needs Jon Brown, Vice President, Market Intelligence #TTGTSummit www.techtarget.com/formarketers

More information

RightScale 2018 State of the Cloud Report DATA TO NAVIGATE YOUR MULTI-CLOUD STRATEGY

RightScale 2018 State of the Cloud Report DATA TO NAVIGATE YOUR MULTI-CLOUD STRATEGY RightScale 2018 State of the Cloud Report DATA TO NAVIGATE YOUR MULTI-CLOUD STRATEGY RightScale 2018 State of the Cloud Report As Public and Private Cloud Grow, Organizations Focus on Governing Costs Executive

More information

5 Signs You Need To Upgrade Your Phone System

5 Signs You Need To Upgrade Your Phone System 5 Signs You Need To Upgrade Your Phone System 1. DOES YOUR PHONE WORK WITH YOU OR AGAINST YOU? The Internet has completely redefined what it means to run a business. We now have access to an endless array

More information

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE SESSION ID: SBX4W5 SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE Dara Such VP & Publisher, Security Networking and IoT TechTarget @darasuch What we ll cover today State of SecOps:

More information

Conducted by Vanson Bourne Research

Conducted by Vanson Bourne Research Conducted by Vanson Bourne Research N o v e m b e r 2 0 1 3 1 3200 INTERVIEWS ALTOGETHER, 1600 IT & 1600 BUSINESS DECISION- MAKERS 100 & 100 IT BUSINESS DECISION- DECISION- MAKERS MAKERS COUNTRIES USA

More information

REALISING JORDAN S MOBILE FUTURE 28 APRIL 2014 AMMAN, JORDAN

REALISING JORDAN S MOBILE FUTURE 28 APRIL 2014 AMMAN, JORDAN REALISING JORDAN S MOBILE FUTURE 28 APRIL 2014 AMMAN, JORDAN ROLE OF THE GSMA WE ARE THE GLOBAL INDUSTRY VOICE SHAPING THE FUTURE OF MOBILE INDUSTRY FORUM POLICY ADVOCATE MARKET THINK TANK BUSINESS CATALYST

More information

SHADOW IT: DATA PROTECTION AND CLOUD SECURITY

SHADOW IT: DATA PROTECTION AND CLOUD SECURITY SHADOW IT: DATA PROTECTION AND CLOUD SECURITY Ines Kirin, Filip Mamić, Dino Dudić Zagreb School of Economics and Management, Croatia Research paper Abstract Shadow IT is a term describing users or whole

More information

Connect & take control

Connect & take control Connect & take control RealVNC invented VNC screen sharing technology over twenty years ago. We deliver secure screen sharing for a wide range of industry applications on all major computer and mobile

More information

MULTI-CLIENT 2017 US INTERCHANGEABLE LENS CAMERA MARKET STUDY. Consumer Imaging Behaviors and Industry Trends SERVICE AREAS:

MULTI-CLIENT 2017 US INTERCHANGEABLE LENS CAMERA MARKET STUDY. Consumer Imaging Behaviors and Industry Trends SERVICE AREAS: SERVICE AREAS: Consumer and Professional Imaging MULTI-CLIENT 2017 US INTERCHANGEABLE LENS CAMERA MARKET STUDY Consumer Imaging Behaviors and Industry Trends SEPTEMBER 2017 contents Table of Contents Executive

More information

Mega Trends in the Technology Service Industry: AR/VR and AI Splashing into the Market. July 17, 2017

Mega Trends in the Technology Service Industry: AR/VR and AI Splashing into the Market. July 17, 2017 Mega Trends in the Technology Service Industry: AR/VR and AI Splashing into the Market July 17, 2017 Mega Trends in the Technology Service Industry: AR/VR and AI Splashing into the Market Rob Brothers

More information

ArcGIS in the Cloud. Andrew Sakowicz & Alec Walker

ArcGIS in the Cloud. Andrew Sakowicz & Alec Walker ArcGIS in the Cloud Andrew Sakowicz & Alec Walker Key Takeaways How to Identify Organizational Strategy & Priorities Esri s Cloud Offerings A Broad Spectrum Successfully Executing Your Strategy The Cloud

More information

SMB Cloud InsightsTM

SMB Cloud InsightsTM 2015 SMB Cloud InsightsTM JAPAN RUSSIA DEFINITIONS Cloud Services Defined This research focuses on the cloud services that matter most to SMBs: IaaS, web presence and web applications, unified communications,

More information

Meet our Example Buyer Persona Adele Revella, CEO

Meet our Example Buyer Persona Adele Revella, CEO Meet our Example Buyer Persona Adele Revella, CEO 685 SPRING STREET, NO. 200 FRIDAY HARBOR, WA 98250 W WW.BUYERPERSONA.COM You need to hear your buyer s story Take me back to the day when you first started

More information