MidMarket Tech Leaders Look to Cut Security Costs While Keeping Network Safe - Slide 7

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
In 2010 When It Comes to IT spending, Your Organization Will:-7

In 2010 When It Comes to IT spending, Your Organization Will:


38 percent of CIOs expect overall spending to increase somewhere between 1 percent to 10 percent.

Most midmarket CIOs are looking to cut their overall costs of securing their data and networks in the coming year, but a good 40 percent of them are planning to fund security system projects to support that goal.


Learn first-hand how   leading technology providers are developing midmarket technologies to solve key business and strategic challenges.

That’s one of the findings of a recent survey of 138 senior midmarket IT executives we conducted about a wide range of issues, from staffing to SaaS adoption to the overall value business sees in IT. (For a full breakdown of the survey results, see CTO Edge Editorial Director Mike Vizard’s analysis here.)

On the security front, 78 percent of the IT execs who responded to the survey said their companies view security as important or a high priority (which, if you listen to a lot of trade press, seems a tad low). Interestingly, only 41 percent of IT execs said they view heightened compliance pressures – a big driver for the focus on security – as a complete positive for IT.

Overall, 59 percent of respondents said they plan on increasing their IT spending in the next 12 months. With the pressure to decrease security in particular, investments in that channel will likely be with an eye toward great automation of traffic and threat analysis – which of course promises operational savings. (You'll also want to check out this list of innovative security companies and products as cited by the RSA Security Conference.)

To learn more about the Midmarket CIO Forum, click here.

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.