Security Tops Concerns for Midmarket CIOs - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next How Interested Is Your Organization in Procuring the Following as Software-as-a-Service?-5 Next

How Interested Is Your Organization in Procuring the Following as Software-as-a-Service?

Backup and storage management top the list.

Base: 389 IT decision-makers; 253 at MSEs and 136 at large enterprises
Source: A commissioned study conducted by Forrester Consulting on behalf of HP, April 2010


Learn first-hand how   leading technology providers are developing midmarket technologies to solve key   business and strategic challenges.

The midmarket CIO lives in a unique IT world. Most IT discussions focus on the trials and tribulations of enterprise IT executives that have huge staffs. But more often than not, the midmarket CIO is taking on many of the same challenges facing Fortune 1000 CIOs with staffs that consist of 10 or fewer people.

Hewlett-Packard commissioned Forrester Research to survey 389 IT decision makers worldwide, with 253 of those executives coming from small to medium-sized enterprises. The findings showed remarkably similar interests between midmarket IT leaders and their larger enterprise brethren.

Surprisingly, security issues topped the list of concerns for midsize IT leaders by a wide margin. Not so surprisingly, reducing costs was a high priority. Unfortunately, most of the organizations didn’t seem to be too far past the initial stages of virtualization adoption, while interest in cloud computing is running a lot higher than actual adoption.

Midmarket IT organizations don’t trail large-scale enterprise IT organizations by much when it comes to emerging technologies; they just have to figure out how to take advantage of them without throwing huge amounts of people at the problem.

Be sure to read Mike Vizard's blog post, "The Changing Dynamics of Midmarket IT," for more.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.