Security Team

Linus Lai

Vice President

Jaclynn Anderson

Research Director, Cybersecurity

Sophia Wang

Senior Research Analyst

Austin Zhao

Senior Research Manager

Christopher Kissel

Research Vice President, Security & Trust Products

Hoang Nguyen

Group Vice President, Worldwide Tracker Program

Jay Bretzmann

Research Vice President, Security Products

Pete Finalle

Research Manager, Security & Trust

Ryan O’Leary

Research Director, Privacy and Legal Technology

Frank Dickson

Group Vice President, Security & Trust

Mike Jude

Research Director, Endpoint Security

Simon Piff

Research Vice President

Grace Trinidad

Research Director, Future of Trust

Scott Tiazkun

Research Manager, Security Services

Michelle Abraham

Research Director, Security and Trust

Amy Cravens

Research Manager, Sustainability and ESG Software

Philip Bues

Sr. Research Manager, Cloud Security

Monika Soltysik

Senior Research Analyst, Security & Trust Products

Jennifer Glenn

Research Director

New Research


  • By: 

    • Christopher Rodriguez Loading
    • Pete Finalle Loading
    This IDC Survey Spotlight examines current enterprise and small business perspectives regarding the key security practices for managing SaaS risk. SaaS offers an extremely simplified means for attaining new features and functionality withou...
  • By: 

    • Pete Finalle Loading
    • Christopher Rodriguez Loading
    This IDC Survey Spotlight highlights the results of IDC's recent Cybersecurity Capabilities Assessment Framework (CCAF) Survey. The survey asked 258 respondents about which network security practices are in use across the majority of their ...
  • By:  Mike Jude Loading

    This IDC Survey Spotlight indicates that the rationale for acquiring and implementing physical security technology is shifting away from safety and security to a more business-centric focus. This IDC Survey Spotlight illustrates how the foc...
  • By:  Ryan O’Leary Loading

    This IDC Tech Buyer Presentation discusses the privacy and trust impacts of generative AI. This presentation discusses what steps businesses should take to protect themselves.
  • By:  Mike Jude Loading

    This IDC study provides a broad-brush estimation of the physical security technology market size and provides a basis for estimating market growth. It includes software, hardware, and services as well as the key storage and control componen...
  • By:  Amy Cravens Loading

    This IDC TechBrief provides an overview of carbon accounting software, the business benefits of investing in technology, and providers in this market."Carbon reporting has been much in the news over the past several years, with organization...
  • By: 

    • Pete Finalle Loading
    • Christopher Rodriguez Loading
    This IDC Survey Spotlight highlights the results of IDC's recent Cybersecurity Capabilities Assessment Framework (CCAF) Survey, which asked 258 respondents about which network security technologies are in use across the majority of their or...
  • By: 

    • Pete Finalle Loading
    • Christopher Rodriguez Loading
    This IDC study provides market shares for the leading competitors in the worldwide trusted access and network security market."While network security hardware continues to comprise the lion's share of revenue in the trusted access and netwo...
  • By: 

    • Philip Bues Loading
    • Frank Dickson Loading
    This IDC Survey Spotlight dives deeper into organizations generative artificial intelligence (GenAI) investments and most likely strategic GenAI technology partner over the next 12 months. The document contains data from IDC's July 2023 Fut...
  • By:  Philip Bues Loading

    This IDC Survey Spotlight dives deeper into U.S. organizations greatest security challenges and which services, devices, and/or systems are most impacted by ransomware. The document contains data from IDC's March 2023 Future Enterprise Resi...

  • «First | ‹Previous | 451 to 460 of 632 results | Next› | Last»