sponsored by ComputerWeekly.com
Posted:  30 Nov 2012
Published:  30 Nov 2012
Format:  PDF
Length:  75  Page(s)
Type:  Research Content
Language:  English
ABSTRACT:

 


This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.

 

Despite the downturn, 40% of organisations plan to increase their security budgets in 2013 in response to rising threats, with only 5% planning cuts in security spending.

 

Malware and external threats top security concerns in the face of increasingly sophisticated attacks.

 

Compliance ranks higher than mobile in the list of top concerns, web application and cloud security despite increased hacker focus on these areas.

 

Over 250 IT professionals in the UK and Europe took part in this survey conducted in November 2012.

 

Contents:

  • Security budget trends
  • Top security concerns in business
  • Security spending in the cloud
  • Mobile device security spending
  • Take-up of mobile device management
  • Use of dynamic and static source code testing tools
  • Database activity monitoring
  • Policy and risk management software
  • Security training
  • Security as a service priorities
  • Data loss prevention
  • Next generation firewalls
  • Security Information and event management
  • Network Access Control
  • Encryption and anti-malware
  • Intrusion Detection Systems
  • Intrusion Prevention Systems
  • Network Security Technologies
  • Advanced Threats
  • Vulnerability Management Strategies
  • Authentication including software, hardware and biometrics
  • Defending against targeted attacks
  • Satisfaction with security suppliers

 

Click on the button to download the full  report.

 






BROWSE RELATED RESOURCES
Access Control | Anti-Spyware Software | Authentication | Biometrics | Cloud Security | Data Loss Prevention (DLP) | Database Security | Encryption Standards | Firewall Appliances | Firewall Server Hardware | Firewall Server Software | Intrusion Detection | Intrusion Detection Systems | Intrusion Prevention | Intrusion Prevention Systems | Malware | Mobile Device Management | Risk Management | Security | Security Policies | Security Spending | Security Systems | Security Threats | Software as a Service | Testing | Training | Vendor Selection | Vendors | Virus Detection Software | Virus Protection | Vulnerability Assessments | Vulnerability Management

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement