Security Tops Concerns for Midmarket CIOs - Slide 4

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Plans to Adopt Infrastructure-as-a-Service, also Known as Cloud Computing-4 Next

Plans to Adopt Infrastructure-as-a-Service, also Known as Cloud Computing

Large-scale enterprises are a little further down the path.

Base: 389 IT decision-makers; 253 at MSEs and 136 at large enterprises
Source: A commissioned study conducted by Forrester Consulting on behalf of HP, April 2010


Learn first-hand how   leading technology providers are developing midmarket technologies to solve key   business and strategic challenges.

The midmarket CIO lives in a unique IT world. Most IT discussions focus on the trials and tribulations of enterprise IT executives that have huge staffs. But more often than not, the midmarket CIO is taking on many of the same challenges facing Fortune 1000 CIOs with staffs that consist of 10 or fewer people.

Hewlett-Packard commissioned Forrester Research to survey 389 IT decision makers worldwide, with 253 of those executives coming from small to medium-sized enterprises. The findings showed remarkably similar interests between midmarket IT leaders and their larger enterprise brethren.

Surprisingly, security issues topped the list of concerns for midsize IT leaders by a wide margin. Not so surprisingly, reducing costs was a high priority. Unfortunately, most of the organizations didn’t seem to be too far past the initial stages of virtualization adoption, while interest in cloud computing is running a lot higher than actual adoption.

Midmarket IT organizations don’t trail large-scale enterprise IT organizations by much when it comes to emerging technologies; they just have to figure out how to take advantage of them without throwing huge amounts of people at the problem.

Be sure to read Mike Vizard's blog post, "The Changing Dynamics of Midmarket IT," for more.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.