skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.

Out of danger comes opportunity.

Demand for cybersecurity expertise, software, appliances and services is on the rise, with high-profile attacks continuing to make global headlines. Despite recognition that not all security incidents can be prevented, enterprises are spending more on cybersecurity – over $22 billion in 2020.

 

Cybersecurity progression by industry

CYBERSECURITY title

Source: Omdia

 

11 percent.

Only 11 percent of enterprises globally have a fully developed approach to cybersecurity risk and over 38 percent of organizations have barely started their efforts to develop such approaches...

 

Omdia_MaxineHolt"Enterprises require a business-wide, risk-based approach to cybersecurity that extends beyond technology. Although technology is at the heart defense, organizations also require people and processes to complete the protection picture. Compliance demands, aligning information security strategy with organizational  objectives, and digital risk management gives the information security function a significant challenge to protect the enterprise while enabling it to build for the future." 

Maxine Holt
Research Director
Cybersecurity

 

 

Only with Omdia.

Why are significant portions of cybersecurity spending down over 17 percent from last year and why is adoption of threat mitigation technologies and approaches so disparate? Isolate what is growing and what is slowing and why – with Omdia, you can be secure in your knowledge…

Overachieve with Omdia.

Cybersecurity with an integrated technology, media & telecommunications focus that melds robust, data-driven decision support with meticulous insight into the enterprise information security agenda and detailed spending for cybersecurity products… 

  • Cybersecurity Accelerator 

    In-depth coverage of threat mitigation technologies for networks, data centers, the cloud, mobile devices and IoT 

  • Cybersecurity Threat Mitigation & Detection 

    Analysis, insights, and forecasts for content & network security, DDoS prevention, cloud/CPE-managed security and threat mitigation 

  • IoT Cybersecurity 

    Vendor market shares, analysis, and revenue by domain, technology, region and vertical  

  • Cybersecurity Surveys & Reports 

    Surveys of cloud, datacenter, service provider, and enterprise technology and services buyers, market trend and landscape, product evaluation, and case study reports by vertical

Latest research

  • All Categories
  • Cybersecurity
  • Enterprise Technology
  • Cloud & Data Center
All Categories
  • Embracing disruption will be necessary to win in cybersecurity's next era

    Cybersecurity

    Embracing disruption will be necessary to win in cybersecurity's next era

    McAfee, RSA Security, and Symantec have been at the center of the enterprise cybersecurity technology landscape for decades. These industry bedrocks have become synonymous with security, having pioneered and refined many of the capabilities that remain fundamental to successful enterprise cyberdefense.

  • Omdia Market Radar: Zero-Trust Access

    Cybersecurity, Enterprise IT

    Omdia Market Radar: Zero-Trust Access

    Tech emerges for secure remote access to applications in the cloud era

  • Data Privacy Day is nearly upon us

    Cybersecurity

    Data Privacy Day is nearly upon us

    Data Privacy Day is nearly here. January 28, 2020 marks the 14th such day since the launch in Europe of Data Protection Day in 2007. Privacy and protection are interchangeably used terms, but both focus on ensuring that data is kept safe. Yet organizations are consistently failing to keep safe the personally identifiable information (PII) they hold about individuals.

  • The key to a resilient organization is a comprehensive backup and recovery plan and capability

    Cybersecurity

    The key to a resilient organization is a comprehensive backup and recovery plan and capability

    When it comes to cyberattacks, organizations can fail if there are inadequate security incident response plans in place. The "six P's" mantra clearly applies: proper preparation and planning prevents poor performance.

  • "Dishonorable" data protection practice

    Cybersecurity

    "Dishonorable" data protection practice

    Alongside names of recipients, the UK's New Year Honours' list for January 2020 briefly featured the full address of each recipient – a serious breach of data security by the UK government's Cabinet Office.

  • Spotlight on IoT cybersecurity

    Cybersecurity

    Spotlight on IoT cybersecurity

    As adoption of the IoT is only expected to grow in the coming years, it’s vital that we stay ahead of the various cybersecurity threats such adoption will undoubtedly introduce

  • CISOs must speak the language of enterprise

    Cybersecurity

    CISOs must speak the language of enterprise

    The role of CISO is being reshaped by the greater role that security now plays, and the need to protect a rapidly expanding portfolio of digital assets without inhibiting the organization from meeting goals.

  • Fortinet acquires SOAR vendor CyberSponse

    Cybersecurity

    Fortinet acquires SOAR vendor CyberSponse

    Fortinet has acquired security orchestration, automation, and response (SOAR) vendor CyberSponse in the latest in a series of opportunistic tuck-in acquisitions.

  • Maersk CISO offers important lessons three years after NotPetya attack

    Cybersecurity

    Maersk CISO offers important lessons three years after NotPetya attack

    At Black Hat Europe 2019, the CISO of Maersk, which was decimated by the 2017 NotPetya attack, highlighted several lessons learned, including the equal importance of recovery alongside detection and prevention, and the growing value of threat hunting.

  • Black Hat Europe: How serious are social engineering and human hacking?

    Cybersecurity

    Black Hat Europe: How serious are social engineering and human hacking?

    Black Hat Europe took place in London in the first week of December 2019 and Omdia was invited to participate in a panel discussion about trends in social engineering and human hacking. All too often people are described as the “weakest link” when it comes to security, but this is unfair.

  • Trend Micro's new partnership addresses open source security, solidifies its shift toward developers

    Cybersecurity

    Trend Micro's new partnership addresses open source security, solidifies its shift toward developers

    A new partnership with open source security specialist Snyk enables Trend Micro to provide new open source vulnerability detection capabilities to DevOps environments, and grants Snyk access to Trend Micro's growing customer base.

Cybersecurity experts at Omdia.

Analyst

Jeff Wilson

Research Director & Advisor, Cybersecurity Technology USA 19 + years experience
Specialities include Cybersecurity
Products covered Cybersecurity
Analyst

Tanner Johnson

Senior Analyst, Connectivity & IoT USA 13 + years experience
Specialities include IoT Cybersecurity
Products covered Internet of Things
Analyst

Maxine Holt

Research Director UK 20 + years experience
Specialities include Information Security
Products covered Enterprise IT, Cybersecurity