Premium Content

Access "Efficacy of Emerging Network Security Technologies"

Efficacy-of-Emerging-Network-Security-Technologies-(1367246823_701).jpg

Sponsored by ComputerWeekly.com

Organisations surveyed in the U.K. are becoming increasingly concerned about the threat of intellectual property theft and confidential information being used to access business-critical systems, this report from the Ponemon Institute and Juniper Networks reveals. The report, which surveyed 4,774 global IT and IT security professionals across nine countries including over 520 professionals in the U.K., identified the challenges enterprises are facing around emerging security threats and their ability to defend against them. The research found that the growing sophistication of cyber attacks, the changing threat landscape, and an increasing fear of theft of intellectual property and trade secrets, are spurring investment in network security technologies.  Access >>>

Table of contents

  • Perceptions about emerging network technologies
  • Network security posture of organizations in this study
  • Efficacy of emerging network security technologies

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Coding for Kids
    Coding For Kids.jpg
    E-Handbook

    Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.

  • The Technology Industry Survey 2015
    MS_tech_survey.jpg
    E-Handbook

    This is the fourth annual Technology Industry Survey, produced by Computer Weekly and Mortimer Spinks. This year, 3,408 technology professionals ...

  • Winning security use cases in the Computer Weekly European 2014 Awards
    CW_European_User_Awards_2014_security-252.jpg
    E-Handbook

    Warwick Ashford presents five IT security case studies selected from the winners of Computer Weekly's European User Awards.