IT Struggles with Priorities

IT Struggles with Priorities

IT Struggles with PrioritiesIT Struggles with Priorities

IT decision-makers have trouble defining and executing their priorities as security concerns loom large.

Ability to Define and Execute PrioritiesAbility to Define and Execute Priorities

Only 57% of respondents said they can clearly define and execute IT priorities, but 75% do have a formal IT strategy.

Importance of IT StrategyImportance of IT Strategy

Those IT decision-makers possessing an IT strategy are twice as likely to execute IT priorities.

The Rest of the StruggleThe Rest of the Struggle

Aside from budgets, respondents struggled most with security concerns (34%), diverse business requirements (27%), and too many different opinions (25%).

How Organizations Meet Their GoalsHow Organizations Meet Their Goals

63% of respondents said that to meet their organization’s goals, they currently spend on maintenance, whereas 37% said they spend on new technologies.

How Organizations Expect to Meet Future GoalsHow Organizations Expect to Meet Future Goals

Respondents said that in 2020, they expect to spend 56% of their budgets on maintenance and 44% on new technologies.

Plans to Enhance Security InfrastructurePlans to Enhance Security Infrastructure

49% of respondents said they want improvements like next-generation firewalls, advanced endpoint protection, email security, and identity and access management.

Cloud-Based Apps and ProductivityCloud-Based Apps and Productivity

Only 13% of respondents have all the consumer technology they need. To improve employee productivity with technology, 40% said they want faster networks, and 35% want mobile devices.

Emerging Technologies and Future SuccessEmerging Technologies and Future Success

Respondents said that they expect success in the future through cloud management software and platforms, predictive analytics and the Internet of Things.

Karen A. Frenkel
Karen A. Frenkel is a contributor to CIO Insight. She covers cybersecurity topics such as digital transformation, vulnerabilities, phishing, malware, and information governance.

Latest Articles