MidMarket Tech Leaders Look to Cut Security Costs While Keeping Network Safe - Slide 3

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Your Organization Views IT Security To Be:-3 Next

Your Organization Views IT Security To Be:

While 78 percent say their shops consider security to be at least an important priority.

Most midmarket CIOs are looking to cut their overall costs of securing their data and networks in the coming year, but a good 40 percent of them are planning to fund security system projects to support that goal.

MIDMARKET CIO FORUM

Learn first-hand how   leading technology providers are developing midmarket technologies to solve key business and strategic challenges.

That’s one of the findings of a recent survey of 138 senior midmarket IT executives we conducted about a wide range of issues, from staffing to SaaS adoption to the overall value business sees in IT. (For a full breakdown of the survey results, see CTO Edge Editorial Director Mike Vizard’s analysis here.)

On the security front, 78 percent of the IT execs who responded to the survey said their companies view security as important or a high priority (which, if you listen to a lot of trade press, seems a tad low). Interestingly, only 41 percent of IT execs said they view heightened compliance pressures – a big driver for the focus on security – as a complete positive for IT.

Overall, 59 percent of respondents said they plan on increasing their IT spending in the next 12 months. With the pressure to decrease security in particular, investments in that channel will likely be with an eye toward great automation of traffic and threat analysis – which of course promises operational savings. (You'll also want to check out this list of innovative security companies and products as cited by the RSA Security Conference.)

To learn more about the Midmarket CIO Forum, click here.
 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.