Security Team

Linus Lai

Vice President

Jaclynn Anderson

Research Director, Cybersecurity

Sophia Wang

Senior Research Analyst

Austin Zhao

Senior Research Manager

Christopher Kissel

Research Vice President, Security & Trust Products

Hoang Nguyen

Group Vice President, Worldwide Tracker Program

Jay Bretzmann

Research Vice President, Security Products

Pete Finalle

Research Manager, Security & Trust

Ryan O’Leary

Research Director, Privacy and Legal Technology

Frank Dickson

Group Vice President, Security & Trust

Mike Jude

Research Director, Endpoint Security

Simon Piff

Research Vice President

Grace Trinidad

Research Director, Future of Trust

Scott Tiazkun

Research Manager, Security Services

Michelle Abraham

Research Director, Security and Trust

Amy Cravens

Research Manager, Sustainability and ESG Software

Philip Bues

Sr. Research Manager, Cloud Security

Monika Soltysik

Senior Research Analyst, Security & Trust Products

Jennifer Glenn

Research Director

New Research


  • By: 

    • Linus Lai Loading
    • Cathy Huang Loading
    This Market Perspective captures the key takeaways from the IBM Analyst Insights 2024 event in Singapore, highlighting IBM's strategic focus on hybrid and AI technologies, emphasizing its differentiation through AI integration in consulting...
  • By:  Simon Piff Loading

    This IDC Survey, conducted in June 2024, is a global survey of IT professionals on their plans, concerns, and perspectives as they relate to IT infrastructure investments both current and future.The Asia/Pacific study is comprised of 342 re...
  • By:  Christopher Kissel Loading

    This IDC Market Analysis Perspective (MAP) provides a view of the cloud-native XDR and artificial intelligence (AI) security analytics market. There are many confluences converging in cybersecurity in autumn 2024. The bloom is fading on gen...
  • By: 

    • Jennifer Glenn Loading
    • Scott Tiazkun Loading
    This IDC Survey analyzes ransomware data from IDC's June 2024 Future Enterprise Resiliency and Spending Survey and looks at its impact across different vertical industries. Ransomware continues to impact organizations with alarming frequenc...
  • By: 

    • Stewart Bond Loading
    • Jennifer Glenn Loading
    • Phil Goodwin Loading
    • Neil Ward-Dutton Loading
    • Amy Machado Loading
    • Holly Muscolino Loading
    • Lynne Schneider Loading
    • Dr. Chris Marshall Loading
    This IDC Tech Buyer Presentation provides an architectural model for organizations to work on making data AI ready as they move through the AI adoption journey. The architecture represents an update to IDC's Enterprise Intelligence Architec...
  • By:  Michelle Abraham Loading

    This IDC Survey Spotlight compares the answers received to our question of how many gigabytes does your SIEM ingest each day from two different time periods. The data comes from IDC's November 2021 U.S. Security SOC Tools Survey and the Nor...
  • By: 

    • Sophia Wang Loading
    • James Wang Loading
    本次技术评估报告主要围绕安全访问服务边缘产品开展。IDC定义下的安全访问服务边缘(SASE)是一种新兴的安全实践,强调将SD-WAN等网络技术与SSE等网络安全技术融合,作为一种集成云服务交付。其中,安全服务边缘(SSE)集成了多种网络安全技术,如防火墙即服务、安全Web网关(SWG)、云访问安全代理(CASB)和零信任网络访问(ZTNA)。软件定义广域网(SD-WAN)是一种网络技术,使用软件定义网络技术来优化应用程序性能、可靠性并降低成本。IDC中国网络安全市场高级分析师...
  • By: 

    • Emanuel Figueroa Loading
    • Philip Bues Loading
    • Jay Bretzmann Loading
    Oracle CloudWorld 2024 has demonstrated the transformative power of Oracle by showing that no matter the space, Oracle Cloud Infrastructure (OCI) not only knows how to play the game, but it is also redefining it. Oracle has created a new bl...
  • By:  Jay Bretzmann Loading

    This IDC study provides a forecast for the worldwide identity and access management (IAM) market for 2024–2028."As what many have called the new perimeter for network security, good identity practices have been difficult to achieve," said J...
  • By: 

    • Michelle Abraham Loading
    • Frank Dickson Loading
    This IDC Survey Spotlight evaluates the responses to questions regarding the organization's phase of AI deployment and whether security and governance professionals are brought in to the decision process for design, development, and deploym...

  • «First | ‹Previous | 51 to 60 of 631 results | Next› | Last»