Enterprise Cybersecurity Adoption Report 2021​

$3,000.00$6,000.00

Enterprise Cybersecurity Adoption Report 2021 - Cover thumb

120-page adoption report with detailed insights on current cybersecurity threats, solutions, and vendors including:

  • 9 most common cybersecurity threats and their assessment by end-users
  • 29 cybersecurity solutions focusing on end-point security, network security and secure lifecycle management
  • Insights on 99 vendors including satisfaction by region and industry
  • Enterprise budget allocation & decision process (decision makers, information sources, selection criteria)
  • Cybersecurity deep-dives: A. Security of the operations (OT) and B. Security of smart connected products
  • Insights on cybersecurity priorities as a result of COVID-19
  • Key success factors for making IoT security technologies work
  • And more…

REQUEST SAMPLE

Clear

Description

Enterprise Cybersecurity Adoption Report 2021

The Enterprise Cybersecurity Adoption Report 2021 is part of IoT Analytics’ ongoing coverage of IoT software & platforms (IoT Platforms/Software Research Workstream). The information presented in this report is based on an extensive survey, with leading cybersecurity decision-makers among manufacturing and other industries. The purpose is to inform other market participants about the current state of cybersecurity threats and adoption of cybersecurity tools across companies. Survey participants were randomly selected, and their knowledge independently verified. In order to ensure complete objectivity, IoT Analytics did not alter or supplement any survey results and also did NOT accept any participation from participants that were suggested from third-parties (e.g., customers of specific vendors). 

FIND OUT

  • What cybersecurity threats are seen as most risky? 
  • What cybersecurity solutions are companies adopting and to which degree? 
  • Which cybersecurity tools are seen as most effective? 
  • Which are some of the common cybersecurity vendors and how well-perceived are they? 
  • Who is deciding and influencing the purchase of cybersecurity products and services? 
  • How is the spending distributed across the tech stack? 
  • Which regions are preferred to host servers with cybersecurity related data or software? 
  • How do companies secure their operations? 
  • How do companies secure their connected product? 
  • How has COVID-19 impacted the cybersecurity situation? 
  • What are best-practices of mitigating IoT security risks? 

AVAILABLE PLANS

MARKET REPORT
SINGLE USER LICENSE

$3,000 120 page PDF
    • 1 Named user (in your organization within the country of purchase)
    • Complete market report in PDF

MARKET REPORT
TEAM USER LICENSE

$4,000 120 page PDF
    • 1-5 Named users (in your organization within the country of purchase)
    • Complete market report in PDF

MARKET REPORT
ENTERPRISE PREMIUM LICENSE

$6,000 120 page PDF/PPT
    • Unlimited users (in your organization within the country of purchase)
    • Complete market report in PDF
    • Complete market report in PPT

 

Request Sample

AT A GLANCE

The Enterprise Cybersecurity Adoption Report 2021 analyses the adoption of cybersecurity solutions, how vendors are rated and what makes cybersecurity work. The report is based on a survey of 60 cybersecurity professionals (CISOs, CIOs, or similar) and highlights the end-user perspective.

Enterprise Cybersecurity Adoption Report 2021 - What is covered by enterprise cybersecurity

The report analyzes the cybersecurity situation across 7 chapters: 

  1. Cybersecurity threats 
  2. Cybersecurity tools and their effectiveness 
  3. Cybersecurity budgets & decision process​es 
  4. Specific deep-dives 
  5. Vendor​ landscape 
  6. Impact of COVID-19 and lockdowns 
  7. Success factors for IoT security 

Enterprise Cybersecurity Adoption Report 2021 - Scope of report

The report looks at 29 different cybersecurity solutions/tools from two perspectives: deployment and effectiveness

Enterprise Cybersecurity Adoption Report 2021 - Overview of most deployed and most effective cybersecurity technologies

Enterprise Cybersecurity Adoption Report 2021 - Endpoint security - Deployment of individuals tools

Enterprise Cybersecurity Adoption Report 2021 - Effectiveness and deployment of cybersecurity solutions

The cybersecurity budget allocation is shown today as well as the trend for the next three years

Enterprise Cybersecurity Adoption Report 2021 - Allocation of Cybersecurity budget now and in 3 years

The report identifies 99 vendors. The top vendors are segmented into overall usage and satisfaction rates by world region and industry. 

Enterprise Cybersecurity Adoption Report 2021 - Most used vendors by region and industry

METHODOLOGY

Enterprise Cybersecurity Adoption Report 2021 - Research Methodology

TABLE OF CONTENTS

Enterprise Cybersecurity Adoption Report 2021 - Table of contents 1

Enterprise Cybersecurity Adoption Report 2021 - Table of contents 2

COMPANIES MENTIONED IN THE REPORT

Cisco, Microsoft, Palo Alto NetworksFortinet, McAfee, Symantec, IBM, Darktrace and 91 more.

TERMS & CONDITIONS

The terms and conditions of the different plans for the report can be found HERE.

RELATED READING

IoT Analytics published a blog post on “The leading enterprise cybersecurity companies 2021” which is derived from the report which can be viewed HERE.

SAMPLE

Request a sample of the report

Request Sample

OUR INSIGHTS ARE TRUSTED BY

Intel Logo Grey_iot analytics
abb_logo_grey
toshiba_logo_grey
Microsoft_logo_grey
amazon_logo_grey
Verizon Logo
Bosch Logo
Johnson Controls Logo
Siemens Logo
Hewlett Packard Enterprise logo
PTC_Logo_grey
arm_logo_grey
deutsche_telekom_logo_grey
hitachi_logo_grey
ibm_logo_grey
qualcomm_logo_grey
Rockwell_Automation_logo_grey
samsung_logo_grey"
schneider_electric_logo_grey"
wef_logo_grey

Additional information

Publication date

December 2020

Scope

120 page PDF/PPT

Inquiry email

sales@iot-analytics.com

Inquiry phone

+49 (0) 40-63911891

Terms & Conditions

https://iot-analytics.com/termsconditions/

Table of Contents

Table of content (PDF)

  1. Overview & main findings
    1. Executive Summary (1/3)
    2. Executive Summary (2/3)
    3. Executive Summary (3/3)
    4. Global cybersecurity threats & adoption 2020 – Overview
    5. Global cybersecurity threats & adoption 2020 – by world region
  2. Topic introduction
    1. What is covered by enterprise cybersecurity ?
    2. Importance of cybersecurity
    3. Convergence of OT security and IT security
    4. Non-exhaustive timeline of notable cyberattacks in 2020
  3. Methodology & introduction
    1. Research methodology
    2. Full list of survey questions
    3. Overview of survey respondents (1/3): Industries surveyed
    4. Overview of survey respondents (2/3): Sample of surveyed companies
    5. Overview of survey respondents (3/3): Role in the organization
    6. This report analyses cybersecurity through 7 lenses
    7. Chapter 4: Cybersecurity threats
    8. Chapter 5: Cybersecurity capabilities and their effectiveness
    9. Chapter 6: Enterprise budgets & decision processes
    10. Chapter 7: Securing the operations and the connected product
    11. Chapter 8: Vendor landscape
    12. Chapter 9: Cybersecurity initiatives during pandemic and lockdowns
    13. Chapter 10: Best-practices and successful risk mitigation
  4. Cybersecurity threats
    1. Chapter 4: Cybersecurity threats – Overview & key takeaways
    2. Average assessment of risk
    3. Deep-dive (1/10): Average assessment of risk
    4. Deep-dive (2/10): Malware
    5. Deep-dive (3/10): Ransomware
    6. Deep-dive (4/10): Advanced persistent threats (APTs)
    7. Deep-dive (5/10): Insider threat
    8. Deep-dive (6/10): Denial-of-service (DDoS)
    9. Deep-dive (7/10): Application hijacking
    10. Deep-dive (8/10): Man-in-the-middle (MITM) attack
    11. Deep-dive (9/10): Brute force attack
    12. Deep-dive (10/10): Physical tampering
    13. Success at mitigating cybersecurity risks
  5. Cybersecurity tools
    1. Chapter 5: Cybersecurity tools – Overview & key takeaways
    2. Average number of fully deployed cybersecurity solutions
    3. Cybersecurity solutions are split into three main categories
    4. Overview of most deployed and most effective cybersecurity technologies
    5. End-point security: Effectiveness of security tools
    6. Network security: Deployment of individual tools
    7. Network security: Effectiveness of security tools
    8. Secure lifecycle management: Deployment of individual tools
    9. Secure lifecycle management: Effectiveness of security tools
    10. Deep-dive AI & cloud-based cybersecurity tools (1/2)
    11. Deep-dive AI & cloud-based cybersecurity tools (2/2)
    12. Effectiveness and deployment of cybersecurity solutions
    13. The next frontier – the tools that companies are currently considering
    14. Most used cybersecurity services
    15. Procurement of security services
  6. Cybersecurity budgets & decision processes
    1. Chapter 6: Cybersecurity budgets & decision – Overview & key takeaways
    2. Allocation of cybersecurity budget now and in 3 years
    3. Decision power for cybersecurity products and services
    4. Importance of information sources for selection process
    5. Importance of information sources for selection process – by region
    6. Importance of information sources for selection process – by company size
    7. Importance of vendor selection criteria
    8. General importance of selection criteria – by region
    9. General importance of selection criteria – by company size
    10. Consideration of location for hosting security data/software
    11. Consideration of location for hosting security data/software – by comp. HQ
  7. Security specific deep-dives
    1. Chapter 7: Security specific deep-dives – Overview & key takeaways
    2. Deep-dive A Operations: Security approaches
    3. Deep-dive A Operations: Security operations task force (1/2)
    4. Deep-dive A Operations: Security operations task force (2/2)
    5. Deep-dive B Smart Products: Vendor selection criteria
    6. Deep-dive B Smart Products: Vendor selection criteria – by region
    7. Deep-dive B Smart Products: Vendor selection criteria – by size
    8. Deep-dive B Smart Products: Lifetime tech stack spending
    9. Deep-dive B Smart Products: Preferred type of cybersecurity vendor
    10. Deep-dive B Smart Products: Preferred type of cybersecurity vendor – region
    11. Deep-dive B Smart Products: Preferred type of cybersecurity vendor – size
  8. Vendor Landscape
    1. Chapter 8: Vendor landscape – Overview & key takeaways
    2. Average number of cybersecurity vendors used by company
    3. Most used cybersecurity vendors by region and industry – Top 10 by usage
    4. Most used cybersecurity vendors by region and industry – Top 20 by usage
    5. Additional vendors mentioned by respondents
  9. Impact of Covid-19
    1. Chapter 9: Impact of COVID-19 and lockdowns – Overview & key takeaways
    2. Cybersecurity during pandemic and lockdown
    3. Share of respondents that have seen an increased amount of security attacks
    4. Share of respondents that have seen new types of security attacks
    5. Share of respondents that focus on stronger cyber hygiene
    6. Share of respondents that review risk management practices
    7. Planning to increase security budget after Covid-19 lockdown
    8. Expectation of security-related regulations
    9. Challenges with “Shadow IoT” during COVID-19
    10. How has Covid-19 impacted the security strategy
  10. Success factors for IoT security
    1. Chapter 10: Success factors for IoT security- Overview & key takeaways
    2. Success at mitigating cybersecurity risks
    3. 9 key success factors for IoT security identified
    4. Key Success factors (1/6)
    5. Key Success factors (2/6)
    6. Key Success factors (3/6)
    7. Key Success factors (4/6)
    8. Key Success factors (5/6)
    9. Key Success factors (6/6)
  11. Appendix
Back to Top
Google+