What capabilities would you expect to include as part of the domain of security?
Data Leakage Protection38%
Antivirus44%
Firewall17%
Other - I'll add it to the comments1%
238 PARTICIPANTS
Content you might like
Slow recovery response times34%
Data availability is limited49%
Too expensive to scale effectively52%
Difficult to manage for widespread use37%
Prone to misconfiguration12%
No - There are no drawbacks7%
567 PARTICIPANTS
Predict the future: The majority of data-driven business decisions will be automated within the next
Year6%
5 years53%
10 years26%
15 years8%
20 years3%
>20 years1%
Never2%
95 PARTICIPANTS
Director in Manufacturing, 1,001 - 5,000 employees
We capture it as part of our permissions services. We don’t call out every single group policy but do for the majority and have a catch all for the general service as part of permissions.Chief Information Officer in Healthcare and Biotech, 1,001 - 5,000 employees
Our quickest spend reduction came from end point standardization and the narrowing of standard equipment to a menu of options. A standard replacement scheduled was implemented allowing a reliable prediction of endpoint costs. ...read moreCTO in Software, 201 - 500 employees
Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.
Plus a whole lot more.