When evaluating data security solutions, which of the following is your top priority?

Solution cost11%

Effectiveness54%

End-to-end platform offering19%

Implementation7%

Integration5%

Solution management overhead2%

Other

748 PARTICIPANTS
3.6k viewscircle icon3 Comments
Sort by:
Director of Information Security in Energy and Utilities4 years ago

Interesting that integration is not getting a lot of love over here. One of the things that is a major roadblock is a bazillion point solutions that exist and having a good integration ability is critical towards wider adoption and utilization of said security solution.

Lightbulb on3
Associate Vice President, Information Technology & CISO in Education4 years ago

If it fits into the vendor consolidation strategy

Lightbulb on1
Fractional CIO in Services (non-Government)4 years ago

Other: Fit to the overall roadmap that we have in place.

Lightbulb on1

Content you might like

Reverse engineering15%

Application cloning31%

Code tampering46%

Intellectual property theft47%

API abuse37%

Cryptographic key exposure14%

Unsecure storage14%

Customer data exposure9%

View Results

Rule-based expert systems for decision-making20%

Traditional machine learning algorithms (e.g. linear regression, decision trees)41%

Systems requiring manual feature engineering38%

Early natural language processing (NLP) systems (relying on rule-based approaches)46%

Legacy AI hardware (hardware architectures/specialized AI chips not suitable for deep learning models)24%

Early chatbots and virtual assistants (lacking natural language processing)16%

Other2%

None

View Results