By Thor Olavsrud
June 9, 2017
451 Research study also found the following:
- Data loss prevention, network access control and encryption are the most sought-after cloud-based security capabilities, followed by threat management, application control, SSL decryption and URL filtering.
- Threat management and branch office enablement and optimization were the top cloud-based security use cases cited by respondents, followed by multiprotocol label switching (MPLS) displacement, MSSP displacement, on-demand security and securing SaaS applications.
- More than 60 percent of respondents cited legacy IT as the greatest barrier to improving visibility and control within their networks, followed by lack of budget (27 percent).