DEBUG: PAGE=domain, TITLE=Digital Transformation,ID=1573,TEMPLATE=subprogram
toggle expanded view
programcode = ITSDIG
programid = 193
database = t
alerts = t
neat = t
vendors = t
forecasting = f
confidence = f
definitions = t

Search within: Digital Transformation:

Access our analyst expertise:

Only NelsonHall clients who are logged in have access to our analysts and advisors for their expert advice and opinion.

To find out more about how NelsonHall's analysts and sourcing advisors can assist you with your strategy and engagements, please contact our sales department here.

Subscribe to blogs & alerts:

manage email alerts using the form below, in order to be notified via email whenever we publish new content:

has Database = t

Contracts Database

for Digital Transformation

Track the pattern of service adoption by monitoring Digital Transformation contract awards by your peers. Identify who are the successful vendors this industry now. Updated monthly!

These documents are available to logged in clients that have purchased access to this program.

has Confidence = f -- IGNORED

Deloitte- Cyber Resiliency

Vendor Analysis

by Mike Smart

published on May 21, 2019

Access to this report is restricted to logged in clients with access. Login to get full access

Report Overview:

This NelsonHall vendor assessment analyzes Deloitte’s offerings and capabilities in cyber resiliency.

Deloitte divides its cyber resiliency services into four domains:

  • Cyber Strategy with services including roadmap and architecture design; risk management; and training, education and awareness
  • Cyber Secure which provide traditional and advanced managed security services for client infrastructure, applications, and data
  • Cyber Vigilant, that prepare organizations for managed security services by defining and implementing cyber intelligence
  • Cyber Resilient, to prepare for and respond to successful cyberattacks.

Deloitte and its member firms have ~11k FTEs in its risk management and security practice providing cybersecurity consultancy and managed services from its Cyber Intelligence Centers (CICs).

Who is this Report for:

NelsonHall’s Cyber Resiliency profile on Deloitte is a comprehensive assessment of Deloitte’s offerings and capabilities designed for:

  • Sourcing managers monitoring the capabilities of existing suppliers of managed security services and identifying vendor suitability for resiliency services RFPs
  • Vendor marketing, sales, and business managers looking to benchmark themselves against their peers
  • Financial analysts and investors specializing in the IT services sector.

Scope of this Report:

The report provides a comprehensive and objective analysis of Deloitte’s cyber resiliency offerings and capabilities, and market and financial strengths, including:

  • Identification of the company’s strategy, emphasis, and new developments
  • Analysis of the company’s strengths, weaknesses, and outlook
  • Revenue estimates
  • Analysis of the profile of the company’s customer base including the company’s targeting strategy and examples of current contracts
  • Analysis of the company’s offerings and key service components
  • Analysis of the company’s delivery organization including the location of delivery locations.

Key Findings & Highlights:

This NelsonHall vendor assessment analyzes Deloitte’s offerings and capabilities in cyber resiliency.

Deloitte divides its cyber resiliency services into four domains:

  • Cyber Strategy with services including roadmap and architecture design; risk management; and training, education and awareness
  • Cyber Secure which provide traditional and advanced managed security services for client infrastructure, applications, and data
  • Cyber Vigilant, that prepare organizations for managed security services by defining and implementing cyber intelligence
  • Cyber Resilient, to prepare for and respond to successful cyberattacks.

Deloitte and its member firms have ~11k FTEs in its risk management and security practice providing cybersecurity consultancy and managed services from its Cyber Intelligence Centers (CICs).

Login to get full access:

close