Skip to content

90-Second Demo

Results Guarantee

Client Login

Search:
SimplyDIRECT
Survey Based Demand Generation
SimplyDIRECT
  • About
    • Our Team
      • Leadership
      • Customer Success
      • Operations
      • Sales
    • Our Clients
    • Giving Back
  • Services
    • Surveys
    • Custom Data Build
      • Free Trial
    • Market Research
    • Content Creation
      • White Papers
      • Infographics
      • Pulse Reports
    • Direct Mail
  • Case Studies
    • Testimonials
  • Research
  • Blog
  • News
  • Contact
Linkedin page opens in new windowTwitter page opens in new windowYouTube page opens in new windowMail page opens in new window
  • About
    • Our Team
      • Leadership
      • Customer Success
      • Operations
      • Sales
    • Our Clients
    • Giving Back
  • Services
    • Surveys
    • Custom Data Build
      • Free Trial
    • Market Research
    • Content Creation
      • White Papers
      • Infographics
      • Pulse Reports
    • Direct Mail
  • Case Studies
    • Testimonials
  • Research
  • Blog
  • News
  • Contact

Blog

arrows

IT Security Buyers Defined

Marketing Predictions Guru Lisa VitaleWe wondered about the key characteristics and requirements of IT security solution buyers – what they’re thinking and what’s driving their behaviors – so we conducted a survey with Gatepoint Research.  While the survey touched on a number of pressing issues, and the resulting market brief is deep with insight, for this post we’re exploring just one key topic: who are the primary buyers of IT security solutions, where do you find them, and what are their titles, responsibilities, and characteristics? (Note: for the full read, follow the link at the bottom.)

 

To better understand our target audience, we’ll begin with a short overview of their context:

 

What’s motivating buyers?  The challenge:

 

Cyber  attacks are increasing both in number and sophistication.  This clear risk to organizations has elevated information security to a key strategic concern in the vast majority of boardrooms. 

 

 

Who is making buying decisions?  The decision-making process:

 

While senior management was indeed concerned with security, most management teams delegate purchase decisions on IT security solutions to IT professionals and their management – the appropriate CxO or VP.

 

Customarily, the technical staff recommends upwards to the CIO or Chief Privacy Officer (CPO), who is primarily concerned with budgetary considerations and rarely questions those recommendations.  Typical budgetary authority for enterprise-level organizations runs from $250k to $1m.  In general, IT security solution decisions are made by committee:

“The decision is a collective decision: the technologists talk with vendors and have a technical evaluation; business managers work on the commercialization issues and skills needed versus available; purchasing gets involved with pricing and T’s & C’s; sign-off is by the CSO who is a VP-level executive.  One person cannot sign off on a security.”  –survey respondent

 

 

Where are the buyers? Industry Segments and hot markets:

 

In mature markets, Financial Services are focused not only on protecting access within their own networks, but are also considering the vulnerability of their extended vendors’ networks and the full chain of custody for transactions.

 

At the other end of the spectrum, strong emerging markets are in retail and healthcare.  The recent spate of thefts among major retailers of sensitive customer data (most notably, credit card records) has exposed security needs and prompted investment.  For healthcare companies, the security of patient information has long been an issue, but the more recent electronic implementation of patient records systems has created new and larger security concerns.  In these organizations, security solution decision makers are likely to be a part of a customer privacy organization, perhaps under a CPO, rather than directly part of the IT organization.

 

Key responsibilities of IT security decision makers: 

 

Among the most pressing of responsibilities for IT security decision makers are ensuring regulatory compliance (such as SOX 404,GLBA, OCC, OTS, FFIEC Standards, HIPAA), as well as compliance with internal and external audit processes.  Part and parcel to this is the development and management of information security strategy and risk mitigation, including:

  • Governance, risk and compliance policy drafting, formulation and analysis.
  • Creating action plans
  • Disaster recovery/business continuity (DR/BC) & IT security risk assessment, IT audit, and IT vendor management.
  • Security information management tool selection and implementation.
  • Architecture and implementation of information security and DR/BC applications.
  • Project life cycle management.

 

 

Key concerns and attitudes: 

 

The growing sophistication of cyber threats requires a corresponding, proactive growth in organizational capabilities to protect and complicate access. Although this is a critical component, it is sometimes frustrated by a lack of budget and resources, or senior management support.  Yet experts agree that the vast majority of threat mitigation is ultimately non-technical and an issue for better governance and employee training.  The emerging trends of cloud computing, mobile computing, and BYOD all pose significant end-user vulnerabilities which need to be explicitly addressed with good governance.

 

 

Implications for vendors:

 

These pressing concerns of IT security solution buyers create a significant opportunity for vendors to provide timely and much needed solutions.  On the technical side of this equation, buyers require the ability to deal with advanced threats, including the support of cloud-related Big Data, mobile, and BYOD scenarios.  Vendors who can package these technical components in a user-friendly, easily adopted and deployed format, will position themselves well to aid buyers in addressing their non-technical security issues – namely, employee compliance with BYOD and Smartphone policy through easy-to-use solutions that add value.

 

 

For further insight into the needs and mindsets of IT security solution buyers, read our full report which includes the following topics:

  • What’s happening to IT security budgets in 2014?
  • What are the top IT security priorities in 2014?
  • What are the biggest causes of vulnerability?
  • How satisfied are IT security professionals with their current solutions and security capabilities?
  • How do IT security professionals buy?
  • What do IT security professionals expect from vendor’s sales reps?

 

 

About SimplyDIRECT:

 

SimplyDIRECT with its subsidiary Gatepoint Research designs, drafts and deploys opt-in, invitation-only surveys to management-level executives within leading technology companies. Using web, phone and email-based data collection, its cutting-edge IT trends research and data analysis helps in the generation of custom reports and thought-leadership content. 

  • Lisa Vitale
  • June 16, 2014
  • Categories: Blog
  • Tags: account penetration, B2B Vertical
Recent Posts
How to Increase Your Chances of Targeting the Right Accounts First
Gatepoint Research article presents: Hold The Line: Reducing Employee Dependence On Phones
Align Once, Measure Twice: Success Metrics for Marketing and Sales Teams
More Posts
Categories
Tags
abm account-based marketing account-based surveys account penetration alignment B2B buyers B2B Content marketing B2B Marketing B2B marketing strategy B2B sales B2B sales process Big Data busiess persona buyer's journey buyer behavior buyer engagement buying process campaign success Commercial Insight Compelling content content marketing content relevancy customer engagement data databases decision maker demand generation email lists good leads Insight Selling IT decision makers key accounts lead generation list building prospect surveys remarkable content Sales and marketing Alignment sales enablement sales process sales prospecting social media target account target accounts thought leadership web surveys

Contact Us

Locate us.

490A Boston Post Road
Suite 14
Sudbury, MA 01776

Give us a call.

978-823-1670

Send us an email.

sales@simplydirect.com

Get In Touch

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

    © 2023 SimplyDIRECT Corp.
    Privacy Policy
    Go to Top
    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
    Do not sell my personal information.
    Cookie SettingsACCEPT
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT