IDC Technology Spotlight:

New Email Paradigm Requires New Security Approaches

Essential requirements for contemporary email security solutions

The explosion in cloud adoption has blurred and nearly eliminated the boundaries that existed between the enterprise and the outside world. Businesses today are challenged to keep pace with digital transformation while also protecting themselves from cybercriminals who use advanced email attacks to breach the non-perimeter.

In the IDC Technology Spotlight, IDC analyst Konstantin Rychkov explores how cloud has created a sprawling attack vector for cybercriminals and an increased burden on security professionals. To meet these challenges, Rychkov says, businesses need to move toward cloud native, highly automated solutions with AI-based threat detection capabilities.

Key findings and recommendations

Inside the report, IDC examines the current threat landscape and offers recommendations for choosing a security solution that matches the sophistication of today’s most common—and dangerous—email attacks.


  • Why digital transformational forces security professionals to think deperimeterization
  • How cloud email adoption exacerbates the shortcomings of legacy SEG architecture
  • Critical email security capabilities, including specialized threat analysis and protection
  • Why organizations should consider Vade Secure to protect their Office 365 email
IDC techspolight


International Data Corporation (IDC)

Is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries.