1. I D C E X E C U T I V E B R I E F
The Extended Enterprise: Manage
C o m pl exi t y, C o s t, a n d C ompl i a nc e
December 2009
Adapted from Worldwide and U.S. Security Services 2009–2012 Forecast and Analysis: Economic
www.idc.com
Crisis Impact Update by Irida Xheneti, IDC #216111
Introduction
F.508.935.4015
Today's business operating environment across all industries has
become a challenging and competitive arena. As organizations strive
to grow and capture market share, they use a variety of business
models and solutions to successfully achieve their business
objectives. For example, organizations add more employees or
expand their partner and supplier ecosystem as well as their
P.508.872.8200
customer base. They also rely on technology advancement to enable
their business to run more efficiently and more securely to increase
the productivity of their employees and enable more efficient
collaboration with partners, suppliers, and customers.
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA
As the technology arena evolves with the introduction of mobile
devices, IP communication, wireless networks, virtualization, cloud
computing and green IT initiatives, and many other technologies,
organizations are looking for cost-efficient means to deploy,
integrate, and manage these technologies securely. While an open
IT infrastructure and innovative technologies enable companies to
increase productivity and revenue, they also open the door to a
plethora of security threats and vulnerabilities, business disruption,
and security infrastructure challenges such as data breaches, data
loss, noncompliance, decreased customer confidence, and many
more. The threat landscape becomes more complex, especially
during a downturn in the economy, when security breaches increase
while organizations look to cut costs and remain secure and
compliant with industry regulations. Furthermore, internal and
external pressures continue to rise as a result of the high stakes
between new technology investments and the risk that security
threats pose to organizations.
To address these security concerns, organizations require a
proactive risk management strategy that enables them to identify and
prioritize the most critical assets that need to be secured and allows
them to verify that proprietary data is not leaving the network
perimeter. In addition, organizations need a secure and cost-
effective way to manage their networks, systems, and applications,
as well as their information assets, while staying focused on their
IDC_860