Security Team

Christopher Kissel

Research Vice President, Security & Trust Products

Hoang Nguyen

Group Vice President, Worldwide Tracker Program

Jay Bretzmann

Research Vice President, Security Products

Pete Finalle

Research Manager, Security & Trust

Ryan O’Leary

Research Director, Privacy and Legal Technology

Frank Dickson

Group Vice President, Security & Trust

Mike Jude

Research Director, Video Surveillance & Vision Applications

Simon Piff

Research Vice President

Grace Trinidad

Research Director, Future of Trust

Scott Tiazkun

Research Manager, Security Services

Michelle Abraham

Research Director, Security and Trust

Amy Cravens

Research Manager, GRC and ESG Management and Reporting Technologies

Philip Bues

Research Manager, Cloud Security

Monika Soltysik

Senior Research Analyst, Security & Trust Products

Jennifer Glenn

Research Director

New Research


  • By:  Jennifer Glenn Loading

    This IDC Market Note discusses IBM's acquisition of Polar Security as well as the launch of a new SaaS security tool. The combination of these two announcements indicates a market focus on smaller to midsized enterprises.
  • By: 

    • Frank Dickson Loading
    • Michelle Abraham Loading
    • Christopher Kissel Loading
    This IDC Survey examines the topic of cyberinsurance and ransomware. It leverages IDC's Future Enterprise Resiliency and Spending Survey of 952 IT decision makers in 18 countries, 7 industry segments, and 5 sizes of organizations and addres...
  • By: 

    • Craig Robinson Loading
    • Cathy Huang Loading
    • Scott Tiazkun Loading
    • Frank Dickson Loading
    This IDC study presents the new five-year forecast for security services. Security service providers (SPs) need to understand how global threats, economic conditions, the increased role of the Board and the C-suite, and the growing regulato...
  • By: 

    • Frank Dickson Loading
    • Jay Bretzmann Loading
    • Mike Jude Loading
    • Ryan O’Leary Loading
    • Grace Trinidad Loading
    As generative artificial intelligence gains traction, concerns rise for managing and controlling the integrity and privacy of growing data stores. Sensitive identity or confidential information may be uploaded into an AI model with little t...
  • By: 

    • Pete Finalle Loading
    • Christopher Rodriguez Loading
    This IDC study provides an overview and comparison of options in the network edge security-as-a-service (NESaaS) market. The need to consolidate security technologies into a single technology stack has emerged as a top-of-mind concern in re...
  • By: 

    • Pete Finalle Loading
    • Christopher Rodriguez Loading
    This IDC study provides an overview of available ZTNA solutions on their own merit while factoring in the advantages of the broader vendor portfolio as their competitive differentiators. ZTNA is an updated approach for enabling secure user ...
  • By:  Ryan O’Leary Loading

    This IDC Survey Spotlight covers corporate legal's expected benefits from artificial intelligence (AI) use and presents a comprehensive analysis of the corporate legal survey conducted by IDC in June 2023, focusing on the anticipated advant...
  • By: 

    • Philip Bues Loading
    • Jay Bretzmann Loading
    • Frank Dickson Loading
    This IDC Market Glance provides an illustrative snapshot of the breadth of cloud security offerings in IaaS marketplaces. One of the most significant innovations in cloud security is in the area of sales and monetization. The advent of secu...
  • By:  Jay Bretzmann Loading

    This IDC study examines the market shares of identity and access management vendors in 2022."Most security teams are expanding their identity programs, adding new protections and tools to help them deal with the ever-expanding problem of id...
  • By: 

    • Ed Lee
    • Philip Bues Loading
    • Frank Dickson Loading
    This IDC study presents a five-year forecast for the worldwide cloud workload security market."The complexity created by multicloud and hybrid cloud implementations remains a major security challenge for enterprises. Security vendors must e...

  • «First | ‹Previous | 261 to 270 of 477 results | Next› | Last»