Picture
SEARCH
What are you looking for?
Need help finding what you are looking for? Contact Us
Compare

PUBLISHER: IDC | PRODUCT CODE: 1389542

Cover Image

PUBLISHER: IDC | PRODUCT CODE: 1389542

Central and Eastern Europe Security Solutions Forecast, 2022-2027

PUBLISHED:
PAGES: 24 Pages
DELIVERY TIME: 1-2 business days
SELECT AN OPTION
PDF (Single User License)
USD 7500

Add to Cart

This IDC Market Forecast report details the projected revenue from security hardware, software, and services for the Central and Eastern Europe region (excluding Russia) for the 2023-2027 period. In addition to the market revenue data, the report includes insights from IDC's 2023 annual European Security Technologies and Strategies survey, which gathers end-user insights from 700 chief information security officers (CISOs) and other security leaders in the region. "CEE organizations face an intense threat landscape characterized by rampant ransomware, sophisticated social engineering, software supply chain risk, and additional disruption triggered by geopolitical tension. The advent of generative AI brings further risk in the form of fraud and intellectual property theft. GenAI could also prove to be a tool in the arsenal of cyber defenders, alleviating the security operational burden of short-staffed CEE security teams, but suppliers need to come with affordable solutions that address key use cases - before the cybercriminals do." - Associate Research Director Mark Child, IDC European Security

Product Code: EUR150145123

IDC Market Forecast Figure

Executive Summary

Advice for Technology Suppliers

  • CEE Organizations Have Clear Needs from their Security Providers
  • Cloud Security and GRC the Top Technology Priorities for 2023

Market Forecast

Market Context

  • Drivers and Inhibitors
    • Drivers
    • Inhibitors
      • Macroeconomic Outlook Remains Gloomy
  • Significant Market Developments
  • Changes from Prior Forecast

Market Definition

  • Security Products Market
    • Network Security
      • Secure Access and Segmentation
      • Zero Trust Edge
      • Active Application Security
    • Endpoint Security
      • Corporate Endpoint Security
        • Modern Endpoint Security
        • Server Security
        • Consumer Digital Life Protection
  • Identity and Access Management
    • Access
      • Identity Management
      • Consumer Identity and Access Management
    • Legacy/Other
    • Privilege
      • Advanced Authentication
      • Privileged Access Management
    • Governance
      • Identity Governance Administration
    • Security Analytics
      • Security Information and Event Management
      • Vulnerability Management
      • Tier 2 SOC Analytics and Cloud-Native XDR
        • Automation and Orchestration Tools
        • Network Intelligence and Threat Analytics
        • Cloud-Native Extended Detection and Response
    • Data Security
      • Information Protection
        • Messaging
        • Data Loss Technologies
        • Data Access Governance
        • Data Privacy and Compliance
      • Digital Trust
        • Encryption and Related Technologies
        • Key Management
        • Certificates
        • Database and Tools
    • Governance, Risk, and Compliance
  • Security Services Markets
    • Security Consulting Services
    • Security Deployment and Integration Services
    • Security Operations Services
      • Managed Security Services - Customer Premises Equipment (MSS-CPE)
      • Managed Hosted Security Services (MSS Hosted)
    • Security Education and Training Services

Methodology

Related Research

Have a question?
Picture

Jeroen Van Heghe

Manager - EMEA

+32-2-535-7543

Picture

Christine Sirois

Manager - Americas

+1-860-674-8796

Questions? Please give us a call or visit the contact form.
Hi, how can we help?
Contact us!