Notice: Global Information Announces Listing on JASDAQ Standard Market of the Tokyo Stock Exchange

Cover Image
Market Research Report

Enterprise Cybersecurity Adoption Report 2021

Published by IoT Analytics GmbH Product code 974429
Published Content info 120 Pages
Delivery time: 1-2 business days
Price
Back to Top
Enterprise Cybersecurity Adoption Report 2021
Published: December 3, 2020 Content info: 120 Pages
Description

120-page adoption report with detailed insights on current cybersecurity threats, solutions, and vendors including:

  • 9 most common cybersecurity threats and their assessment by end-users
  • 29 cybersecurity solutions focusing on end-point security, network security and secure lifecycle management
  • Insights on 99 vendors including satisfaction by region and industry
  • Enterprise budget allocation & decision process (decision makers, information sources, selection criteria)
  • Cybersecurity deep-dives: A. Security of the operations (OT) and B. Security of smart connected products
  • Insights on cybersecurity priorities as a result of COVID-19
  • Key success factors for making IoT security technologies work
  • And more...

The“ Enterprise Cybersecurity Adoption Report 2021” is part of IoT Analytics' ongoing coverage of IoT software & platforms (IoT Platforms/Software Research Workstream) . The information presented in this report is based on an extensive survey, with leading cybersecurity decision-makers among manufacturing and other industries. The purpose is to inform other market participants about the current state of cybersecurity threats and adoption of cybersecurity tools across companies. Survey participants were randomly selected, and their knowledge independently verified. In order to ensure complete objectivity, IoT Analytics did not alter or supplement any survey results and also did NOT accept any participation from participants that were suggested from third-parties (e.g., customers of specific vendors).

FIND OUT

  • What cybersecurity threats are seen as most risky?
  • What cybersecurity solutions are companies adopting and to which degree?
  • Which cybersecurity tools are seen as most effective?
  • Which are some of the common cybersecurity vendors and how well-perceived are they?
  • Who is deciding and influencing the purchase of cybersecurity products and services?
  • How is the spending distributed across the tech stack?
  • Which regions are preferred to host servers with cybersecurity related data or software?
  • How do companies secure their operations ?
  • How do companies secure their connected product ?
  • How has COVID-19 impacted the cybersecurity situation?
  • What are best-practices of mitigating IoT security risks?

AT A GLANCE:

The “Enterprise Cybersecurity Adoption Report 2021” analyses the adoption of cybersecurity solutions, how vendors are rated and what makes cybersecurity work. The report is based on a survey of 60 cybersecurity professionals (CISOs, CIOs, or similar) and highlights the end-user perspective.

The report analyzes the cybersecurity situation across 7 chapters:

  • 1. Cybersecurity threats
  • 2. Cybersecurity tools and their effectiveness
  • 3. Cybersecurity budgets & decision processes
  • 4. Specific deep-dives
  • 5. Vendor landscape
  • 6. Impact of COVID-19 and lockdowns
  • 7. Success factors for IoT security

The report looks at 29 different cybersecurity solutions/tools from two perspectives: deployment and effectiveness

The cybersecurity budget allocation is shown today as well as the trend for the next three years

The report identifies 99 vendors. The top vendors are segmented into overall usage and satisfaction rates by world region and industry.

Table of Contents

Table of Contents

1. Overview & main findings

  • Executive Summary (1/3)
  • Executive Summary (2/3)
  • Executive Summary (3/3)
  • Global cybersecurity threats & adoption 2020 - Overview
  • Global cybersecurity threats & adoption 2020 - by world region

2. Topic introduction

  • What is covered by enterprise cybersecurity ?
  • Importance of cybersecurity
  • Convergence of OT security and IT security
  • Non-exhaustive timeline of notable cyberattacks in 2020

3. Methodology & introduction

  • Research methodology
  • Full list of survey questions
  • Overview of survey respondents (1/3): Industries surveyed
  • Overview of survey respondents (2/3): Sample of surveyed companies
  • Overview of survey respondents (3/3): Role in the organization
  • This report analyses cybersecurity through 7 lenses
  • Chapter 4: Cybersecurity threats
  • Chapter 5: Cybersecurity capabilities and their effectiveness
  • Chapter 6: Enterprise budgets & decision processes
  • Chapter 7: Securing the operations and the connected product
  • Chapter 8: Vendor landscape
  • Chapter 9: Cybersecurity initiatives during pandemic and lockdowns
  • Chapter 10: Best-practices and successful risk mitigation

4. Cybersecurity threats

  • Chapter 4: Cybersecurity threats - Overview & key takeaways
  • Average assessment of risk
  • Deep-dive (1/10): Average assessment of risk
  • Deep-dive (2/10): Malware
  • Deep-dive (3/10): Ransomware
  • Deep-dive (4/10): Advanced persistent threats (APTs)
  • Deep-dive (5/10): Insider threat
  • Deep-dive (6/10): Denial-of-service (DDoS)
  • Deep-dive (7/10): Application hijacking
  • Deep-dive (8/10): Man-in-the-middle (MITM) attack
  • Deep-dive (9/10): Brute force attack
  • Deep-dive (10/10): Physical tampering
  • Success at mitigating cybersecurity risks

5. Cybersecurity tools

  • Chapter 5: Cybersecurity tools - Overview & key takeaways
  • Average number of fully deployed cybersecurity solutions
  • Cybersecurity solutions are split into three main categories
  • Overview of most deployed and most effective cybersecurity technologies
  • End-point security: Effectiveness of security tools
  • Network security: Deployment of individual tools
  • Network security: Effectiveness of security tools
  • Secure lifecycle management: Deployment of individual tools
  • Secure lifecycle management: Effectiveness of security tools
  • Deep-dive AI & cloud-based cybersecurity tools (1/2)
  • Deep-dive AI & cloud-based cybersecurity tools (2/2)
  • Effectiveness and deployment of cybersecurity solutions
  • The next frontier - the tools that companies are currently considering
  • Most used cybersecurity services
  • Procurement of security services

6. Cybersecurity budgets & decision processes

  • Chapter 6: Cybersecurity budgets & decision - Overview & key takeaways
  • Allocation of cybersecurity budget now and in 3 years
  • Decision power for cybersecurity products and services
  • Importance of information sources for selection process
  • Importance of information sources for selection process - by region
  • Importance of information sources for selection process - by company size
  • Importance of vendor selection criteria
  • General importance of selection criteria - by region
  • General importance of selection criteria - by company size
  • Consideration of location for hosting security data/software
  • Consideration of location for hosting security data/software - by comp. HQ

7. Security specific deep-dives

  • Chapter 7: Security specific deep-dives - Overview & key takeaways
  • Deep-dive A Operations: Security approaches
  • Deep-dive A Operations: Security operations task force (1/2)
  • Deep-dive A Operations: Security operations task force (2/2)
  • Deep-dive B Smart Products: Vendor selection criteria
  • Deep-dive B Smart Products: Vendor selection criteria - by region
  • Deep-dive B Smart Products: Vendor selection criteria - by size
  • Deep-dive B Smart Products: Lifetime tech stack spending
  • Deep-dive B Smart Products: Preferred type of cybersecurity vendor
  • Deep-dive B Smart Products: Preferred type of cybersecurity vendor - region
  • Deep-dive B Smart Products: Preferred type of cybersecurity vendor - size

8. Vendor Landscape

  • Chapter 8: Vendor landscape - Overview & key takeaways
  • Average number of cybersecurity vendors used by company
  • Most used cybersecurity vendors by region and industry - Top 10 by usage
  • Most used cybersecurity vendors by region and industry - Top 20 by usage
  • Additional vendors mentioned by respondents

9. Impact of Covid-19

  • Chapter 9: Impact of COVID-19 and lockdowns - Overview & key takeaways
  • Cybersecurity during pandemic and lockdown
  • Share of respondents that have seen an increased amount of security attacks
  • Share of respondents that have seen new types of security attacks
  • Share of respondents that focus on stronger cyber hygiene
  • Share of respondents that review risk management practices
  • Planning to increase security budget after Covid-19 lockdown
  • Expectation of security-related regulations
  • Challenges with "Shadow IoT" during COVID-19
  • How has Covid-19 impacted the security strategy

10. Success factors for IoT security

  • Chapter 10: Success factors for IoT security- Overview & key takeaways
  • Success at mitigating cybersecurity risks
  • 9 key success factors for IoT security identified
  • Key Success factors (1/6)
  • Key Success factors (2/6)
  • Key Success factors (3/6)
  • Key Success factors (4/6)
  • Key Success factors (5/6)
  • Key Success factors (6/6)

11. Appendix

Back to Top