How – and why – network security professionals select solutions and suppliers
The first half of 2020 saw organizations go through years-worth of digital transformation in just a couple of months, as much of the world pivoted to remote and home working. For professionals in networking, this has helped to make security decision-making even more complex and challenging than it was before. At the same time, when it comes to enabling and ensuring future business success, making the right network security decisions has become more important than ever.
So when we recently surveyed some 223 respondents working in a range of business and technology roles, all of them involved in networking and/or security, we made sure to ask about how they choose solutions and suppliers. What makes a vendor attractive or unattractive? When would they consider a network security solution from a new supplier? And where should those new suppliers focus their efforts in order to convince prospective buyers?
The answers summarized in our research note will make interesting reading for technology partners such as system integrators, resellers and VARs, and indeed for anyone else seeking to understand what motivates those who influence and authorize purchases.
Download the Research Note to read more…

Bryan is a technology enthusiast and industry veteran. He has been analysing, explaining and writing about IT and business in a highly engaging manner for around three decades. His experience spans the early days of minicomputers and PC technology, through the emergence of cellular data and smart mobile devices, to the latest developments of the software-defined age in which we all live today. Over his career, Bryan has seen at first-hand how IT changes the world – and how the world changes IT – and he brings that extensive insight to his role as an industry analyst.
Have You Read This?
Automation of SAP Master Data Management
Tackling the software skills crunch
Standardized solution implementation services
IT Financial Management Revisited
The global information access opportunity
The IT Transformation Imperative
From multiple clouds to multi-cloud
S/4HANA without compromise