Sale!

Enterprise Cybersecurity Adoption Report 2021​

From $3,000.00$2,100.00

→ Buy now · See pricing

Enterprise Cybersecurity Adoption Report 2021 - Cover thumb

120-page adoption report with detailed insights on current cybersecurity threats, solutions, and vendors including:

  • 9 most common cybersecurity threats and their assessment by end-users
  • 29 cybersecurity solutions focusing on end-point security, network security and secure lifecycle management
  • Insights on 99 vendors including satisfaction by region and industry
  • Enterprise budget allocation & decision process (decision makers, information sources, selection criteria)
  • Cybersecurity deep-dives: A. Security of the operations (OT) and B. Security of smart connected products
  • Insights on cybersecurity priorities as a result of COVID-19
  • Key success factors for making IoT security technologies work
  • And more…

Request Sample

Choose license type:

Description

Enterprise Cybersecurity Adoption Report 2021​

The Enterprise Cybersecurity Adoption Report 2021 is part of IoT Analytics’ ongoing coverage of IoT software & platforms (IoT Platforms/Software Research Workstream).

The information presented in this report is based on an extensive survey, with leading cybersecurity decision-makers among manufacturing and other industries. The purpose is to inform other market participants about the current state of cybersecurity threats and adoption of cybersecurity tools across companies.

Survey participants were randomly selected, and their knowledge independently verified. In order to ensure complete objectivity, IoT Analytics did not alter or supplement any survey results and also did NOT accept any participation from participants that were suggested from third-parties (e.g., customers of specific vendors).

Related reading:

IoT Analytics published a blog post on “The leading enterprise cybersecurity companies 2021” which is derived from the report which can be viewed here.

Find out:

  • What cybersecurity threats are seen as most risky?
  • What cybersecurity solutions are companies adopting and to which degree?
  • Which cybersecurity tools are seen as most effective?
  • Which are some of the common cybersecurity vendors and how well-perceived are they?
  • Who is deciding and influencing the purchase of cybersecurity products and services?
  • How is the spending distributed across the tech stack?
  • Which regions are preferred to host servers with cybersecurity related data or software?
  • How do companies secure their operations?
  • How do companies secure their connected product?
  • How has COVID-19 impacted the cybersecurity situation?
  • What are best-practices of mitigating IoT security risks?

Available pricing plans:

See Terms & Conditions for license details.

At a glance:

The Enterprise Cybersecurity Adoption Report 2021 analyses the adoption of cybersecurity solutions, how vendors are rated and what makes cybersecurity work. The report is based on a survey of 60 cybersecurity professionals (CISOs, CIOs, or similar) and highlights the end-user perspective.
Enterprise Cybersecurity Adoption Report 2021 - What is covered by enterprise cybersecurity
The report analyzes the cybersecurity situation across 7 chapters:

  1. Cybersecurity threats
  2. Cybersecurity tools and their effectiveness
  3. Cybersecurity budgets & decision process​es
  4. Specific deep-dives
  5. Vendor​ landscape
  6. Impact of COVID-19 and lockdowns
  7. Success factors for IoT security
Enterprise Cybersecurity Adoption Report 2021 - What is covered by enterprise cybersecurity
The report looks at 29 different cybersecurity solutions/tools from two perspectives: deployment and effectiveness
Enterprise Cybersecurity Adoption Report 2021 - What is covered by enterprise cybersecurity
Enterprise Cybersecurity Adoption Report 2021 - What is covered by enterprise cybersecurity
Enterprise Cybersecurity Adoption Report 2021 - Effectiveness and deployment of cybersecurity solutions
The cybersecurity budget allocation is shown today as well as the trend for the next three years
The report identifies 99 vendors. The top vendors are segmented into overall usage and satisfaction rates by world region and industry.

Table of contents:

Enterprise Cybersecurity Adoption Report 2021 - Table of contents 1
Enterprise Cybersecurity Adoption Report 2021 - Table of contents 1

Methodology:

Enterprise Cybersecurity Adoption Report 2021 - Research Methodology

Companies mentioned in the report:

Cisco, Microsoft, Palo Alto Networks, Fortinet, McAfee, Symantec, IBM, Darktrace and 91 more.

Sample:

Request a sample of the report:

Additional information

Publication date

December 2020

Scope

120 page PDF/PPT

Inquiry email

sales@iot-analytics.com

Inquiry phone

+49 (0) 40-63911891

Terms & Conditions

https://iot-analytics.com/termsconditions/

Table of Contents

Table of content (PDF)

  1. Overview & main findings
    1. Executive Summary (1/3)
    2. Executive Summary (2/3)
    3. Executive Summary (3/3)
    4. Global cybersecurity threats & adoption 2020 – Overview
    5. Global cybersecurity threats & adoption 2020 – by world region
  2. Topic introduction
    1. What is covered by enterprise cybersecurity ?
    2. Importance of cybersecurity
    3. Convergence of OT security and IT security
    4. Non-exhaustive timeline of notable cyberattacks in 2020
  3. Methodology & introduction
    1. Research methodology
    2. Full list of survey questions
    3. Overview of survey respondents (1/3): Industries surveyed
    4. Overview of survey respondents (2/3): Sample of surveyed companies
    5. Overview of survey respondents (3/3): Role in the organization
    6. This report analyses cybersecurity through 7 lenses
    7. Chapter 4: Cybersecurity threats
    8. Chapter 5: Cybersecurity capabilities and their effectiveness
    9. Chapter 6: Enterprise budgets & decision processes
    10. Chapter 7: Securing the operations and the connected product
    11. Chapter 8: Vendor landscape
    12. Chapter 9: Cybersecurity initiatives during pandemic and lockdowns
    13. Chapter 10: Best-practices and successful risk mitigation
  4. Cybersecurity threats
    1. Chapter 4: Cybersecurity threats – Overview & key takeaways
    2. Average assessment of risk
    3. Deep-dive (1/10): Average assessment of risk
    4. Deep-dive (2/10): Malware
    5. Deep-dive (3/10): Ransomware
    6. Deep-dive (4/10): Advanced persistent threats (APTs)
    7. Deep-dive (5/10): Insider threat
    8. Deep-dive (6/10): Denial-of-service (DDoS)
    9. Deep-dive (7/10): Application hijacking
    10. Deep-dive (8/10): Man-in-the-middle (MITM) attack
    11. Deep-dive (9/10): Brute force attack
    12. Deep-dive (10/10): Physical tampering
    13. Success at mitigating cybersecurity risks
  5. Cybersecurity tools
    1. Chapter 5: Cybersecurity tools – Overview & key takeaways
    2. Average number of fully deployed cybersecurity solutions
    3. Cybersecurity solutions are split into three main categories
    4. Overview of most deployed and most effective cybersecurity technologies
    5. End-point security: Effectiveness of security tools
    6. Network security: Deployment of individual tools
    7. Network security: Effectiveness of security tools
    8. Secure lifecycle management: Deployment of individual tools
    9. Secure lifecycle management: Effectiveness of security tools
    10. Deep-dive AI & cloud-based cybersecurity tools (1/2)
    11. Deep-dive AI & cloud-based cybersecurity tools (2/2)
    12. Effectiveness and deployment of cybersecurity solutions
    13. The next frontier – the tools that companies are currently considering
    14. Most used cybersecurity services
    15. Procurement of security services
  6. Cybersecurity budgets & decision processes
    1. Chapter 6: Cybersecurity budgets & decision – Overview & key takeaways
    2. Allocation of cybersecurity budget now and in 3 years
    3. Decision power for cybersecurity products and services
    4. Importance of information sources for selection process
    5. Importance of information sources for selection process – by region
    6. Importance of information sources for selection process – by company size
    7. Importance of vendor selection criteria
    8. General importance of selection criteria – by region
    9. General importance of selection criteria – by company size
    10. Consideration of location for hosting security data/software
    11. Consideration of location for hosting security data/software – by comp. HQ
  7. Security specific deep-dives
    1. Chapter 7: Security specific deep-dives – Overview & key takeaways
    2. Deep-dive A Operations: Security approaches
    3. Deep-dive A Operations: Security operations task force (1/2)
    4. Deep-dive A Operations: Security operations task force (2/2)
    5. Deep-dive B Smart Products: Vendor selection criteria
    6. Deep-dive B Smart Products: Vendor selection criteria – by region
    7. Deep-dive B Smart Products: Vendor selection criteria – by size
    8. Deep-dive B Smart Products: Lifetime tech stack spending
    9. Deep-dive B Smart Products: Preferred type of cybersecurity vendor
    10. Deep-dive B Smart Products: Preferred type of cybersecurity vendor – region
    11. Deep-dive B Smart Products: Preferred type of cybersecurity vendor – size
  8. Vendor Landscape
    1. Chapter 8: Vendor landscape – Overview & key takeaways
    2. Average number of cybersecurity vendors used by company
    3. Most used cybersecurity vendors by region and industry – Top 10 by usage
    4. Most used cybersecurity vendors by region and industry – Top 20 by usage
    5. Additional vendors mentioned by respondents
  9. Impact of Covid-19
    1. Chapter 9: Impact of COVID-19 and lockdowns – Overview & key takeaways
    2. Cybersecurity during pandemic and lockdown
    3. Share of respondents that have seen an increased amount of security attacks
    4. Share of respondents that have seen new types of security attacks
    5. Share of respondents that focus on stronger cyber hygiene
    6. Share of respondents that review risk management practices
    7. Planning to increase security budget after Covid-19 lockdown
    8. Expectation of security-related regulations
    9. Challenges with “Shadow IoT” during COVID-19
    10. How has Covid-19 impacted the security strategy
  10. Success factors for IoT security
    1. Chapter 10: Success factors for IoT security- Overview & key takeaways
    2. Success at mitigating cybersecurity risks
    3. 9 key success factors for IoT security identified
    4. Key Success factors (1/6)
    5. Key Success factors (2/6)
    6. Key Success factors (3/6)
    7. Key Success factors (4/6)
    8. Key Success factors (5/6)
    9. Key Success factors (6/6)
  11. Appendix

You may also like…