Picture
SEARCH
What are you looking for?
Need help finding what you are looking for? Contact Us
Compare

PUBLISHER: IDC | PRODUCT CODE: 1225634

Cover Image

PUBLISHER: IDC | PRODUCT CODE: 1225634

How Global Threat Intelligence Vendors Address the Nuances of Regional Markets

PUBLISHED:
PAGES: 12 Pages
DELIVERY TIME: 1-2 business days
SELECT AN OPTION
PDF (Single User License)
USD 7500

Add to Cart

This IDC Market Perspective provides an overview of how different types of threat intelligence (TI) vendors offer their TI offerings and meet customer needs. Threat intelligence becomes a requisite today to empower faster threat investigations and efficacy of security operation centers, thus enhance the proactiveness of organization's cyberdefense capabilities. It also has included three detailed vendor examples to illustrate how the vendors position their TI offerings and go-to-market plans for their threat intelligence. "When studying various types of threat intelligence vendors, it is interesting to see big influence of security services vendors like global systems integrators, telecommunication providers, MSSPs in the TI market. It implies the importance of process and people, in addition to the technology and platform in order to make TI function powerful and actionable," says Cathy Huang, research director, Worldwide Security Services at IDC.

Product Code: US49127923

Executive Snapshot

New Market Developments and Dynamics

  • Introduction
  • Global Threat Intelligence and Global Clientele
  • Industry Dynamics
  • Different Types of TI Vendors
    • Professional Services Firms
    • Global Systems Integrators
    • Telecommunication Service Providers/Managed Security Services Providers
    • Cloud Services Providers
    • Threat Intelligence Start-Ups
    • Digital Risk Protection Providers
  • Detailed Vendor Examples
    • Cyberint
    • Cybersixgill
    • CYFIRMA
    • ESET Threat Intelligence Services
    • Kaspersky

Advice for the Threat Intelligence Provider

  • Country-Specific Risk Map
  • Articulate Results Along the Lines of the MITRE ATT&CK Framework
  • Collaborate with Law Enforcement Agencies
  • Persona-Based Dashboard
  • Work with Other Cyberdefenders
  • Expand the Use Case of Threat Intelligence

Learn More

  • Related Research
  • Synopsis
Have a question?
Picture

Jeroen Van Heghe

Manager - EMEA

+32-2-535-7543

Picture

Christine Sirois

Manager - Americas

+1-860-674-8796

Questions? Please give us a call or visit the contact form.
Hi, how can we help?
Contact us!