SlideShare uma empresa Scribd logo
1 de 5
ReportLinker Find Industry reports, Company profiles
and Market Statistics
>> Get this Report Now by email!
Japan IT Security End-User Survey 2014
Published on July 2014
Report Summary
In this IDC study (a translation of the Japanese document IDC #J14210103), we analyze and report the results of a survey on the
implementation of enterprise IT security solutions in Japan conducted by IDC in January 2014.
Security threats like malware that target unknown vulnerabilities and highly stealthy bot viruses are getting harder to detect. When a
security incident surfaces, extensive damages could already have been caused. Speedy status assessment and risk management are
called for. To realize this, it is necessary for user companies to implement solutions that monitor and analyze security incidences and
realize GRC. However, as the results of the current survey indicate, the predominant issue faced by companies when implementing
security solutions is that of "budget," followed by "difficulty in measuring ROI." "User companies should implement security incidences
and GRC solutions and visualize potential security threats. By visualizing the link between security incidents and risk management, IT
departments will be able to demonstrate the necessity of the solutions to management teams," says Tsuneo Tosaka, research
manager, Software & Security, IDC Japan.
Table of Content
Table of ContentsIDC OpinionIn This StudyMethodologyCompany SizeProfile of Survey Respondents and CompaniesExecutive
SummaryIT Security SpendingIT Security BreachesFocal Areas of IT Security SpendingIT Security Solutions
ImplementationSolutions to Enhance ComplianceUse of IT Security ServicesSituation OverviewIT Security Solutions Spending
TrendsIT Security SpendingIT Security BreachesIT Security Spending: Focal AreasIT Security Solutions ImplementationSecurity
Threat ManagementFirewall and VPNIntrusion Detection and Prevention and UTMIdentity and Access ManagementImplementation
Rates of Single Sign-On and Authentication and Authorization SystemsUser Provisioning (such as User Registration and Deletion)
SystemsSecure Content ManagementAntivirus SolutionsImplementation Rates of Antivirus (Client PC) SolutionsNetwork Gateway
and Server Antivirus Solutions ImplementationVirtual Server Security Solutions ImplementationMessaging Security (such as
Antispam) Solutions ImplementationWeb Security (such as URL Filtering Control) Solutions ImplementationSecurity and Vulnerability
ManagementSecurity Information and Event Management SolutionsPolicy Management and GRC Management Solutions
ImplementationVulnerability Assessment (Quarantine Systems and Others) Solutions Implementation RatesSolutions to Enhance
ComplianceSolutions to Comply with Personal Information Protection LawSolutions for Information Leak Prevention (Client PC and
Gateway)Solutions to Prevent Client PC Information Leaks (Encryption Based)Solutions to Prevent Information Leaks through Client
PCs (Non-Encryption-Based Solutions like Device Controls)Solutions to Prevent Information Leaks through Gateways (Email, Web
Browsing)Implementation of Data Loss Prevention ProductsUsage of IT Security ServicesSecurity System Management
ServicesSecurity Consulting ServicesFuture OutlookEssential GuidanceLearn MoreRelated ResearchSynopsisFigure: Respondent
Distribution by AppointmentFigure: Respondent Distribution by Authority Level in Respect of IT Security SolutionsFigure: Appointment
of CIOs and CSOsFigure: Respondent Distribution by IndustryFigure: Respondent Distribution by Company SizeFigure: FY13 IT
Security SpendingFigure: IT Spending as a Share of Capital Spending, FY12 and FY13Figure: Year-over-Year IT Security Spending
Changes in FY13Figure: FY14 Projected YoY IT Security Spending Changes, January 2014 SurveyFigure: FY12-FY14 YoY IT
Security Spending Changes, Previous (January 2013) and Current (January 2014) SurveysFigure: FY14 Projected YoY IT Security
Spending Changes, January 2014 Survey: by IndustryFigure: FY14 Projected IT Security Spending Changes, January 2014 Survey:
Japan IT Security End-User Survey 2014 (From Slideshare) Page 1/5
ReportLinker Find Industry reports, Company profiles
and Market Statistics
>> Get this Report Now by email!
by Company SizeFigure: Security DamagesFigure: Affected IT Assets, Previous (January 2013) and Current (January 2014)
SurveysFigure: Discovery of Security ViolationsFigure: Time Taken to Resolve Security Breaches from Discovery: by CIO and CSO
AppointmentFigure: Major Security Risks Companies Are Concerned AboutFigure: Level of Concern about IT Security ThreatsFigure:
Future IT Security Spending Focal AreasFigure: Implementation Landscapes of IT Security SolutionsFigure: Firewall and VPN
ImplementationFigure: Firewall and VPN Implementation: by IndustryFigure: Firewall and VPN Implementation: by Company
SizeFigure: Firewall and VPN Implementation (Appliance or Software)Figure: Firewall and VPN Implementation (Cloud and
Outsourcing Services or Internal Systems)Figure: Threat Management Solutions (Intrusion Detection or Blocking Using IDS and IPS
and UTM, Etc.) ImplementationFigure: Threat Management Solutions (Intrusion Detection or Blocking Using IDS and IPS and UTM,
Etc.) Implementation: by IndustryFigure: Threat Management Solutions (Intrusion Detection or Blocking Using IDS and IPS and UTM,
Etc.) Implementation: by Company SizeFigure: Threat Management Solutions (Intrusion Detection or Blocking Using IDS and IPS and
UTM, Etc.) Implementation Methods (Appliance or Software)Figure: Threat Management Solutions (Intrusion Detection or Blocking
Using IDS and IPS and UTM, Etc.) Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Single
Sign-On and Authentication and Authorization Systems ImplementationFigure: Single Sign-On and Authentication and Authorization
Systems Implementation: by IndustryFigure: Single Sign-On and Authentication and Authorization Systems Implementation: by
Company SizeFigure: Single Sign-On and Authentication and Authorization Systems Implementation Methods: by System
AreaFigure: Single Sign-On and Authentication and Authorization Systems Implementation (Cloud and Outsourcing Services or
Internal Systems)Figure: User Provisioning (such as User Registration and Deletion) Solutions ImplementationFigure: User
Provisioning (such as User Registration and Deletion) Solutions Implementation: by IndustryFigure: User Provisioning (such as User
Registration and Deletion) Solutions Implementation: by Company SizeFigure: User Provisioning (such as User Registration and
Deletion) Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Client PC Antivirus
Solutions ImplementationFigure: Client PC Antivirus Solutions Implementation: by IndustryFigure: Client PC Antivirus Solutions
Implementation: by Company SizeFigure: Client PC Antivirus Solutions Implementation Methods (Cloud and Outsourcing Services or
Internal Systems)Figure: Network Gateway and Server Antivirus Solutions ImplementationFigure: Network Gateway and Server
Antivirus Solutions Implementation: by IndustryFigure: Network Gateway and Server Antivirus Solutions Implementation: by Company
SizeFigure: Network Gateway and Server Antivirus Solutions Implementation Methods (Appliance or Software)Figure: Network
Gateway and Server Antivirus Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure:
Virtual Server Security Solutions ImplementationFigure: Virtual Server Antivirus Solutions Implementation: by Company SizeFigure:
Messaging Security (such as Antispam) Solutions ImplementationFigure: Messaging Security (such as Antispam) Solutions
Implementation: by IndustryFigure: Messaging Security (such as Antispam) Solutions Implementation: by Company SizeFigure:
Messaging Security (such as Antispam) Solutions Implementation Methods (Appliance or Software)Figure: Messaging Security (such
as Antispam) Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Web Security (such as
URL Filtering Control) Solutions ImplementationFigure: Web Security (such as URL Filtering Control) Solutions Implementation: by
IndustryFigure: Web Security (such as URL Filtering Control) Solutions Implementation: by Company SizeFigure: Web Security (such
as URL Filtering Control) Solutions Implementation Methods (Appliance or Software)Figure: Web Security (such as URL Filtering
Control) Solutions Implementation Methods (Cloud & Outsourcing Services or Internal Systems)Figure: Security Information and
Event Management ImplementationFigure: Security Information and Event Management Implementation: by IndustryFigure: Security
Information and Event Management Implementation: by Company SizeFigure: Security Information and Event Management
Implementation Methods (Appliance or Software)Figure: Security Information and Event Management Implementation Methods
(Cloud and Outsourcing Services or Internal Systems)Figure: Policy Management and GRC Management Solutions
ImplementationFigure: Policy Management and GRC Management Solutions Implementation: by IndustryFigure: Policy Management
and GRC Management Solutions Implementation: by Company SizeFigure: Policy Management and GRC Management Solutions
Implementation Methods (Appliance or Software)Figure: Policy Management and GRC Management Solutions Implementation
Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Vulnerability Assessment (Quarantine Systems and Others)
Solutions ImplementationFigure: Vulnerability Assessment (Quarantine Systems and Others) Solutions Implementation: by
IndustryFigure: Vulnerability Assessment (Quarantine Systems and Others) Solutions Implementation: by Company SizeFigure:
Vulnerability Assessment (Quarantine Systems and Others) Solutions Implementation Methods (Appliance or Software)Figure:
Vulnerability Assessment (Quarantine Systems and Others) Solutions Implementation Methods (Cloud and Outsourcing Services or
Internal Systems)Figure: Interest in IT Security Solutions for Compliance with Personal Information Protection LawFigure: Client PC
Japan IT Security End-User Survey 2014 (From Slideshare) Page 2/5
ReportLinker Find Industry reports, Company profiles
and Market Statistics
>> Get this Report Now by email!
Information Leak (Encryption Based) Solutions ImplementationFigure: Client PC Information Leak (Encryption Based) Solutions
Implementation: by IndustryFigure: Client PC Information Leak (Encryption Based) Solutions Implementation: by Company
SizeFigure: Client PC Information Leak (Non-Encryption Based, such as Device Control) Solutions ImplementationFigure: Client PC
Information Leak (Non-Encryption Based, such as Device Control) Solutions Implementation: by IndustryFigure: Client PC Information
Leak (Non-Encryption Based, such as Device Control) Solutions Implementation: by Company SizeFigure: Gateway (such as Email or
Web Browser) Information Leak Prevention Solutions ImplementationFigure: Gateway (such as Email or Web Browser) Information
Leak Prevention Solutions Implementation: by IndustryFigure: Gateway (such as Email or Web Browser) Information Leak Prevention
Solutions Implementation: by Company SizeFigure: Gateway (such as Email or Web Browser) Information Leak Prevention Solutions
Implementation Methods (Appliance or Software)Figure: Gateway (such as Email or Web Browser) Information Leak Prevention
Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: DLP Products
ImplementationFigure: DLP Products Implementation: by IndustryFigure: DLP Products Implementation: by Company SizeFigure:
Reasons for Implementing DLP ProductsFigure: Issues Faced in Implementing DLP ProductsFigure: IT Security Service
UsageFigure: IT Security Services Companies Intend to Use in the Future: by Company SizeFigure: Security System Management
Outsourcing Service UsageFigure: Security System Operation Management Outsourcing Service Usage: by IndustryFigure: Security
System Management Outsourcing Service Usage: by Company SizeFigure: Security System Management Outsourcing Service
Usage: by FunctionFigure: Level of Concerns about Security Management Outsourcing Issues: by IssueFigure: Security Consulting
Service Usage: by Service CategoryFigure: Security Consulting Service (Security Systems Planning and Strategizing) Usage: by
Company SizeFigure: Security Consulting (Security System Audit) Service Usage: by Company SizeFigure: Security Consulting
(Security System Audit) Service Usage: by Company Size
Japan IT Security End-User Survey 2014 (From Slideshare) Page 3/5
ReportLinker Find Industry reports, Company profiles
and Market Statistics
>> Get this Report Now by email!
Fax Order Form
To place an order via fax simply print this form, fill in the information below and fax the completed form to:
Europe, Middle East and Africa : + 33 4 37 37 15 56
Asia, Oceania and America : + 1 (805) 617 17 93
If you have any questions please visit http://www.reportlinker.com/notify/contact
Order Information
Please verify that the product information is correct and select the format(s) you require.
Product Formats
Please select the product formats and the quantity you require.
Contact Information
Please enter all the information below in BLOCK CAPITALS
Title: Mr Mrs Dr Miss Ms Prof
First Name: _____________________________ Last Name: __________________________________
Email Address: __________________________________________________________________________
Job Title: __________________________________________________________________________
Organization: __________________________________________________________________________
Address: __________________________________________________________________________
City: __________________________________________________________________________
Postal / Zip Code: __________________________________________________________________________
Country: __________________________________________________________________________
Phone Number: __________________________________________________________________________
Fax Number: __________________________________________________________________________
Japan IT Security End-User Survey 2014
1 User License--USD 0.00 Quantity: _____
Japan IT Security End-User Survey 2014 (From Slideshare) Page 4/5
ReportLinker Find Industry reports, Company profiles
and Market Statistics
>> Get this Report Now by email!
Payment Information
Please indicate the payment method, you would like to use by selecting the appropriate box.
Payment by credit card Card Number: ______________________________________________
Expiry Date __________ / _________
CVV Number _____________________
Card Type (ex: Visa, Amex…) _________________________________
Payment by wire transfer Crédit Mutuel
RIB : 10278 07314 00020257701 89
BIC : CMCIFR2A
IBAN : FR76 1027 8073 1400 0202 5770 189
Payment by check UBIQUICK SAS
16 rue Grenette – 69002 LYON, FRANCE
Please note that by ordering from Reportlinker you are agreeing to our Terms and Conditions at
http://www.reportlinker.com/index/terms
Please fax this form to:
Europe, Middle East and Africa : + 33 4 37 37 15 56
Asia, Oceania and America : + 1 (805) 617 17 93
Customer signature:
 
Japan IT Security End-User Survey 2014 (From Slideshare) Page 5/5

Mais conteúdo relacionado

Mais de ReportLinker.com

Global Electric Resistance Welded Pipes Industry
Global Electric Resistance Welded Pipes IndustryGlobal Electric Resistance Welded Pipes Industry
Global Electric Resistance Welded Pipes Industry
ReportLinker.com
 
Hyperalgesia Global Clinical Trials Review, H1, 2013
Hyperalgesia Global Clinical Trials Review, H1, 2013Hyperalgesia Global Clinical Trials Review, H1, 2013
Hyperalgesia Global Clinical Trials Review, H1, 2013
ReportLinker.com
 
Genital Herpes Global Clinical Trials Review, H1, 2013
Genital Herpes Global Clinical Trials Review, H1, 2013Genital Herpes Global Clinical Trials Review, H1, 2013
Genital Herpes Global Clinical Trials Review, H1, 2013
ReportLinker.com
 
The Future of Direct Communications Technologies and Proximity-based Applicat...
The Future of Direct Communications Technologies and Proximity-based Applicat...The Future of Direct Communications Technologies and Proximity-based Applicat...
The Future of Direct Communications Technologies and Proximity-based Applicat...
ReportLinker.com
 
Competing in the European Molecular Diagnostics Market: France, Germany, Ital...
Competing in the European Molecular Diagnostics Market: France, Germany, Ital...Competing in the European Molecular Diagnostics Market: France, Germany, Ital...
Competing in the European Molecular Diagnostics Market: France, Germany, Ital...
ReportLinker.com
 
Bradycardia Global Clinical Trials Review, H1, 2013
Bradycardia Global Clinical Trials Review, H1, 2013Bradycardia Global Clinical Trials Review, H1, 2013
Bradycardia Global Clinical Trials Review, H1, 2013
ReportLinker.com
 
Acid Indigestion / Heartburn/ Pyrosis Global Clinical Trials Review, H1, 2013
Acid Indigestion / Heartburn/ Pyrosis Global Clinical Trials Review, H1, 2013Acid Indigestion / Heartburn/ Pyrosis Global Clinical Trials Review, H1, 2013
Acid Indigestion / Heartburn/ Pyrosis Global Clinical Trials Review, H1, 2013
ReportLinker.com
 
China iron ore mining industry, 2013
China iron ore mining industry, 2013China iron ore mining industry, 2013
China iron ore mining industry, 2013
ReportLinker.com
 
Inguinal Hernia Global Clinical Trials Review, H1, 2013
Inguinal Hernia Global Clinical Trials Review, H1, 2013Inguinal Hernia Global Clinical Trials Review, H1, 2013
Inguinal Hernia Global Clinical Trials Review, H1, 2013
ReportLinker.com
 
Cancer Cachexia Global Clinical Trials Review, H1, 2013
Cancer Cachexia Global Clinical Trials Review, H1, 2013Cancer Cachexia Global Clinical Trials Review, H1, 2013
Cancer Cachexia Global Clinical Trials Review, H1, 2013
ReportLinker.com
 
Pompe Disease Global Clinical Trials Review, H1, 2013
Pompe Disease Global Clinical Trials Review, H1, 2013Pompe Disease Global Clinical Trials Review, H1, 2013
Pompe Disease Global Clinical Trials Review, H1, 2013
ReportLinker.com
 
Abdominal Aortic Aneurysms Global Clinical Trials Review, H1, 2013
Abdominal Aortic Aneurysms Global Clinical Trials Review, H1, 2013Abdominal Aortic Aneurysms Global Clinical Trials Review, H1, 2013
Abdominal Aortic Aneurysms Global Clinical Trials Review, H1, 2013
ReportLinker.com
 

Mais de ReportLinker.com (20)

 
Thisisatest
ThisisatestThisisatest
Thisisatest
 
Global Electric Resistance Welded Pipes Industry
Global Electric Resistance Welded Pipes IndustryGlobal Electric Resistance Welded Pipes Industry
Global Electric Resistance Welded Pipes Industry
 
Global Wireless Gaming Industry
Global Wireless Gaming IndustryGlobal Wireless Gaming Industry
Global Wireless Gaming Industry
 
Hyperalgesia Global Clinical Trials Review, H1, 2013
Hyperalgesia Global Clinical Trials Review, H1, 2013Hyperalgesia Global Clinical Trials Review, H1, 2013
Hyperalgesia Global Clinical Trials Review, H1, 2013
 
Genital Herpes Global Clinical Trials Review, H1, 2013
Genital Herpes Global Clinical Trials Review, H1, 2013Genital Herpes Global Clinical Trials Review, H1, 2013
Genital Herpes Global Clinical Trials Review, H1, 2013
 
The Future of Direct Communications Technologies and Proximity-based Applicat...
The Future of Direct Communications Technologies and Proximity-based Applicat...The Future of Direct Communications Technologies and Proximity-based Applicat...
The Future of Direct Communications Technologies and Proximity-based Applicat...
 
Competing in the European Molecular Diagnostics Market: France, Germany, Ital...
Competing in the European Molecular Diagnostics Market: France, Germany, Ital...Competing in the European Molecular Diagnostics Market: France, Germany, Ital...
Competing in the European Molecular Diagnostics Market: France, Germany, Ital...
 
Competing in the European Clinical Chemistry and Immunodiagnostic Markets: Fr...
Competing in the European Clinical Chemistry and Immunodiagnostic Markets: Fr...Competing in the European Clinical Chemistry and Immunodiagnostic Markets: Fr...
Competing in the European Clinical Chemistry and Immunodiagnostic Markets: Fr...
 
Bradycardia Global Clinical Trials Review, H1, 2013
Bradycardia Global Clinical Trials Review, H1, 2013Bradycardia Global Clinical Trials Review, H1, 2013
Bradycardia Global Clinical Trials Review, H1, 2013
 
Acid Indigestion / Heartburn/ Pyrosis Global Clinical Trials Review, H1, 2013
Acid Indigestion / Heartburn/ Pyrosis Global Clinical Trials Review, H1, 2013Acid Indigestion / Heartburn/ Pyrosis Global Clinical Trials Review, H1, 2013
Acid Indigestion / Heartburn/ Pyrosis Global Clinical Trials Review, H1, 2013
 
China iron ore mining industry, 2013
China iron ore mining industry, 2013China iron ore mining industry, 2013
China iron ore mining industry, 2013
 
World Biomass Report
World Biomass ReportWorld Biomass Report
World Biomass Report
 
World Biofuels Report
World Biofuels ReportWorld Biofuels Report
World Biofuels Report
 
Global Renewable Energy Report
Global Renewable Energy ReportGlobal Renewable Energy Report
Global Renewable Energy Report
 
Solar PV Report
Solar PV ReportSolar PV Report
Solar PV Report
 
Inguinal Hernia Global Clinical Trials Review, H1, 2013
Inguinal Hernia Global Clinical Trials Review, H1, 2013Inguinal Hernia Global Clinical Trials Review, H1, 2013
Inguinal Hernia Global Clinical Trials Review, H1, 2013
 
Cancer Cachexia Global Clinical Trials Review, H1, 2013
Cancer Cachexia Global Clinical Trials Review, H1, 2013Cancer Cachexia Global Clinical Trials Review, H1, 2013
Cancer Cachexia Global Clinical Trials Review, H1, 2013
 
Pompe Disease Global Clinical Trials Review, H1, 2013
Pompe Disease Global Clinical Trials Review, H1, 2013Pompe Disease Global Clinical Trials Review, H1, 2013
Pompe Disease Global Clinical Trials Review, H1, 2013
 
Abdominal Aortic Aneurysms Global Clinical Trials Review, H1, 2013
Abdominal Aortic Aneurysms Global Clinical Trials Review, H1, 2013Abdominal Aortic Aneurysms Global Clinical Trials Review, H1, 2013
Abdominal Aortic Aneurysms Global Clinical Trials Review, H1, 2013
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Japan IT Security End-User Survey 2014

  • 1. ReportLinker Find Industry reports, Company profiles and Market Statistics >> Get this Report Now by email! Japan IT Security End-User Survey 2014 Published on July 2014 Report Summary In this IDC study (a translation of the Japanese document IDC #J14210103), we analyze and report the results of a survey on the implementation of enterprise IT security solutions in Japan conducted by IDC in January 2014. Security threats like malware that target unknown vulnerabilities and highly stealthy bot viruses are getting harder to detect. When a security incident surfaces, extensive damages could already have been caused. Speedy status assessment and risk management are called for. To realize this, it is necessary for user companies to implement solutions that monitor and analyze security incidences and realize GRC. However, as the results of the current survey indicate, the predominant issue faced by companies when implementing security solutions is that of "budget," followed by "difficulty in measuring ROI." "User companies should implement security incidences and GRC solutions and visualize potential security threats. By visualizing the link between security incidents and risk management, IT departments will be able to demonstrate the necessity of the solutions to management teams," says Tsuneo Tosaka, research manager, Software & Security, IDC Japan. Table of Content Table of ContentsIDC OpinionIn This StudyMethodologyCompany SizeProfile of Survey Respondents and CompaniesExecutive SummaryIT Security SpendingIT Security BreachesFocal Areas of IT Security SpendingIT Security Solutions ImplementationSolutions to Enhance ComplianceUse of IT Security ServicesSituation OverviewIT Security Solutions Spending TrendsIT Security SpendingIT Security BreachesIT Security Spending: Focal AreasIT Security Solutions ImplementationSecurity Threat ManagementFirewall and VPNIntrusion Detection and Prevention and UTMIdentity and Access ManagementImplementation Rates of Single Sign-On and Authentication and Authorization SystemsUser Provisioning (such as User Registration and Deletion) SystemsSecure Content ManagementAntivirus SolutionsImplementation Rates of Antivirus (Client PC) SolutionsNetwork Gateway and Server Antivirus Solutions ImplementationVirtual Server Security Solutions ImplementationMessaging Security (such as Antispam) Solutions ImplementationWeb Security (such as URL Filtering Control) Solutions ImplementationSecurity and Vulnerability ManagementSecurity Information and Event Management SolutionsPolicy Management and GRC Management Solutions ImplementationVulnerability Assessment (Quarantine Systems and Others) Solutions Implementation RatesSolutions to Enhance ComplianceSolutions to Comply with Personal Information Protection LawSolutions for Information Leak Prevention (Client PC and Gateway)Solutions to Prevent Client PC Information Leaks (Encryption Based)Solutions to Prevent Information Leaks through Client PCs (Non-Encryption-Based Solutions like Device Controls)Solutions to Prevent Information Leaks through Gateways (Email, Web Browsing)Implementation of Data Loss Prevention ProductsUsage of IT Security ServicesSecurity System Management ServicesSecurity Consulting ServicesFuture OutlookEssential GuidanceLearn MoreRelated ResearchSynopsisFigure: Respondent Distribution by AppointmentFigure: Respondent Distribution by Authority Level in Respect of IT Security SolutionsFigure: Appointment of CIOs and CSOsFigure: Respondent Distribution by IndustryFigure: Respondent Distribution by Company SizeFigure: FY13 IT Security SpendingFigure: IT Spending as a Share of Capital Spending, FY12 and FY13Figure: Year-over-Year IT Security Spending Changes in FY13Figure: FY14 Projected YoY IT Security Spending Changes, January 2014 SurveyFigure: FY12-FY14 YoY IT Security Spending Changes, Previous (January 2013) and Current (January 2014) SurveysFigure: FY14 Projected YoY IT Security Spending Changes, January 2014 Survey: by IndustryFigure: FY14 Projected IT Security Spending Changes, January 2014 Survey: Japan IT Security End-User Survey 2014 (From Slideshare) Page 1/5
  • 2. ReportLinker Find Industry reports, Company profiles and Market Statistics >> Get this Report Now by email! by Company SizeFigure: Security DamagesFigure: Affected IT Assets, Previous (January 2013) and Current (January 2014) SurveysFigure: Discovery of Security ViolationsFigure: Time Taken to Resolve Security Breaches from Discovery: by CIO and CSO AppointmentFigure: Major Security Risks Companies Are Concerned AboutFigure: Level of Concern about IT Security ThreatsFigure: Future IT Security Spending Focal AreasFigure: Implementation Landscapes of IT Security SolutionsFigure: Firewall and VPN ImplementationFigure: Firewall and VPN Implementation: by IndustryFigure: Firewall and VPN Implementation: by Company SizeFigure: Firewall and VPN Implementation (Appliance or Software)Figure: Firewall and VPN Implementation (Cloud and Outsourcing Services or Internal Systems)Figure: Threat Management Solutions (Intrusion Detection or Blocking Using IDS and IPS and UTM, Etc.) ImplementationFigure: Threat Management Solutions (Intrusion Detection or Blocking Using IDS and IPS and UTM, Etc.) Implementation: by IndustryFigure: Threat Management Solutions (Intrusion Detection or Blocking Using IDS and IPS and UTM, Etc.) Implementation: by Company SizeFigure: Threat Management Solutions (Intrusion Detection or Blocking Using IDS and IPS and UTM, Etc.) Implementation Methods (Appliance or Software)Figure: Threat Management Solutions (Intrusion Detection or Blocking Using IDS and IPS and UTM, Etc.) Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Single Sign-On and Authentication and Authorization Systems ImplementationFigure: Single Sign-On and Authentication and Authorization Systems Implementation: by IndustryFigure: Single Sign-On and Authentication and Authorization Systems Implementation: by Company SizeFigure: Single Sign-On and Authentication and Authorization Systems Implementation Methods: by System AreaFigure: Single Sign-On and Authentication and Authorization Systems Implementation (Cloud and Outsourcing Services or Internal Systems)Figure: User Provisioning (such as User Registration and Deletion) Solutions ImplementationFigure: User Provisioning (such as User Registration and Deletion) Solutions Implementation: by IndustryFigure: User Provisioning (such as User Registration and Deletion) Solutions Implementation: by Company SizeFigure: User Provisioning (such as User Registration and Deletion) Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Client PC Antivirus Solutions ImplementationFigure: Client PC Antivirus Solutions Implementation: by IndustryFigure: Client PC Antivirus Solutions Implementation: by Company SizeFigure: Client PC Antivirus Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Network Gateway and Server Antivirus Solutions ImplementationFigure: Network Gateway and Server Antivirus Solutions Implementation: by IndustryFigure: Network Gateway and Server Antivirus Solutions Implementation: by Company SizeFigure: Network Gateway and Server Antivirus Solutions Implementation Methods (Appliance or Software)Figure: Network Gateway and Server Antivirus Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Virtual Server Security Solutions ImplementationFigure: Virtual Server Antivirus Solutions Implementation: by Company SizeFigure: Messaging Security (such as Antispam) Solutions ImplementationFigure: Messaging Security (such as Antispam) Solutions Implementation: by IndustryFigure: Messaging Security (such as Antispam) Solutions Implementation: by Company SizeFigure: Messaging Security (such as Antispam) Solutions Implementation Methods (Appliance or Software)Figure: Messaging Security (such as Antispam) Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Web Security (such as URL Filtering Control) Solutions ImplementationFigure: Web Security (such as URL Filtering Control) Solutions Implementation: by IndustryFigure: Web Security (such as URL Filtering Control) Solutions Implementation: by Company SizeFigure: Web Security (such as URL Filtering Control) Solutions Implementation Methods (Appliance or Software)Figure: Web Security (such as URL Filtering Control) Solutions Implementation Methods (Cloud & Outsourcing Services or Internal Systems)Figure: Security Information and Event Management ImplementationFigure: Security Information and Event Management Implementation: by IndustryFigure: Security Information and Event Management Implementation: by Company SizeFigure: Security Information and Event Management Implementation Methods (Appliance or Software)Figure: Security Information and Event Management Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Policy Management and GRC Management Solutions ImplementationFigure: Policy Management and GRC Management Solutions Implementation: by IndustryFigure: Policy Management and GRC Management Solutions Implementation: by Company SizeFigure: Policy Management and GRC Management Solutions Implementation Methods (Appliance or Software)Figure: Policy Management and GRC Management Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Vulnerability Assessment (Quarantine Systems and Others) Solutions ImplementationFigure: Vulnerability Assessment (Quarantine Systems and Others) Solutions Implementation: by IndustryFigure: Vulnerability Assessment (Quarantine Systems and Others) Solutions Implementation: by Company SizeFigure: Vulnerability Assessment (Quarantine Systems and Others) Solutions Implementation Methods (Appliance or Software)Figure: Vulnerability Assessment (Quarantine Systems and Others) Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: Interest in IT Security Solutions for Compliance with Personal Information Protection LawFigure: Client PC Japan IT Security End-User Survey 2014 (From Slideshare) Page 2/5
  • 3. ReportLinker Find Industry reports, Company profiles and Market Statistics >> Get this Report Now by email! Information Leak (Encryption Based) Solutions ImplementationFigure: Client PC Information Leak (Encryption Based) Solutions Implementation: by IndustryFigure: Client PC Information Leak (Encryption Based) Solutions Implementation: by Company SizeFigure: Client PC Information Leak (Non-Encryption Based, such as Device Control) Solutions ImplementationFigure: Client PC Information Leak (Non-Encryption Based, such as Device Control) Solutions Implementation: by IndustryFigure: Client PC Information Leak (Non-Encryption Based, such as Device Control) Solutions Implementation: by Company SizeFigure: Gateway (such as Email or Web Browser) Information Leak Prevention Solutions ImplementationFigure: Gateway (such as Email or Web Browser) Information Leak Prevention Solutions Implementation: by IndustryFigure: Gateway (such as Email or Web Browser) Information Leak Prevention Solutions Implementation: by Company SizeFigure: Gateway (such as Email or Web Browser) Information Leak Prevention Solutions Implementation Methods (Appliance or Software)Figure: Gateway (such as Email or Web Browser) Information Leak Prevention Solutions Implementation Methods (Cloud and Outsourcing Services or Internal Systems)Figure: DLP Products ImplementationFigure: DLP Products Implementation: by IndustryFigure: DLP Products Implementation: by Company SizeFigure: Reasons for Implementing DLP ProductsFigure: Issues Faced in Implementing DLP ProductsFigure: IT Security Service UsageFigure: IT Security Services Companies Intend to Use in the Future: by Company SizeFigure: Security System Management Outsourcing Service UsageFigure: Security System Operation Management Outsourcing Service Usage: by IndustryFigure: Security System Management Outsourcing Service Usage: by Company SizeFigure: Security System Management Outsourcing Service Usage: by FunctionFigure: Level of Concerns about Security Management Outsourcing Issues: by IssueFigure: Security Consulting Service Usage: by Service CategoryFigure: Security Consulting Service (Security Systems Planning and Strategizing) Usage: by Company SizeFigure: Security Consulting (Security System Audit) Service Usage: by Company SizeFigure: Security Consulting (Security System Audit) Service Usage: by Company Size Japan IT Security End-User Survey 2014 (From Slideshare) Page 3/5
  • 4. ReportLinker Find Industry reports, Company profiles and Market Statistics >> Get this Report Now by email! Fax Order Form To place an order via fax simply print this form, fill in the information below and fax the completed form to: Europe, Middle East and Africa : + 33 4 37 37 15 56 Asia, Oceania and America : + 1 (805) 617 17 93 If you have any questions please visit http://www.reportlinker.com/notify/contact Order Information Please verify that the product information is correct and select the format(s) you require. Product Formats Please select the product formats and the quantity you require. Contact Information Please enter all the information below in BLOCK CAPITALS Title: Mr Mrs Dr Miss Ms Prof First Name: _____________________________ Last Name: __________________________________ Email Address: __________________________________________________________________________ Job Title: __________________________________________________________________________ Organization: __________________________________________________________________________ Address: __________________________________________________________________________ City: __________________________________________________________________________ Postal / Zip Code: __________________________________________________________________________ Country: __________________________________________________________________________ Phone Number: __________________________________________________________________________ Fax Number: __________________________________________________________________________ Japan IT Security End-User Survey 2014 1 User License--USD 0.00 Quantity: _____ Japan IT Security End-User Survey 2014 (From Slideshare) Page 4/5
  • 5. ReportLinker Find Industry reports, Company profiles and Market Statistics >> Get this Report Now by email! Payment Information Please indicate the payment method, you would like to use by selecting the appropriate box. Payment by credit card Card Number: ______________________________________________ Expiry Date __________ / _________ CVV Number _____________________ Card Type (ex: Visa, Amex…) _________________________________ Payment by wire transfer Crédit Mutuel RIB : 10278 07314 00020257701 89 BIC : CMCIFR2A IBAN : FR76 1027 8073 1400 0202 5770 189 Payment by check UBIQUICK SAS 16 rue Grenette – 69002 LYON, FRANCE Please note that by ordering from Reportlinker you are agreeing to our Terms and Conditions at http://www.reportlinker.com/index/terms Please fax this form to: Europe, Middle East and Africa : + 33 4 37 37 15 56 Asia, Oceania and America : + 1 (805) 617 17 93 Customer signature:   Japan IT Security End-User Survey 2014 (From Slideshare) Page 5/5