SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

AI, cybersecurity lead IT investments in Kaseya's 2024 report

11 Jul 2024

AI, cybersecurity lead IT investments in Kaseya's 2024 report
Contact company
Contact Kaseya
icon Add as a preferred source Download PDF version
Related Links
  • Kaseya DattoCon Europe brings Kaseya 365 and other exciting offerings to EMEA customers
  • Honeywell - how disruptive technologies make security systems better

Kaseya, the global provider of AI-powered cybersecurity and IT management software released its 2024 Future of IT Survey Report, which surveyed IT service providers from the Americas, EMEA, and APAC regions.

Based on the report, increasing IT productivity through automation and AI usage are among the top priorities, while IT cybersecurity remains an area for growth, with IT service providers anticipating it will be one of its primary investment areas.

AI Investment: AI taking centre stage

AI usage among IT service providers continues to increase with most respondents prioritising investing in AI to increase overall efficiency.

Forty percent of survey respondents expect AI usage to be the primary budget driver in 2024, suggesting a significant shift in budget allocation towards AI-driven initiatives.

IT automation, AI, and machine learning

37% of respondents are considering investing in AI and machine learning, compared to 20% the year prior

Businesses are increasingly prioritising AI investments, such as IT automation and AI and machine learning, which rank among the top five technologies that IT service providers say they plan to pursue.

37% of respondents are considering investing in AI and machine learning, compared to 20% the year prior.

Enhancing IT efficiency

Three out of four see AI as beneficial for their business, while only 3% doubt its impact, highlighting optimism about AI’s potential to transform operations.

According to the survey findings, there is also a rising trend in the utilisation of AI technologies to enhance IT efficiency by 41% and end-user productivity by 40%, demonstrating the increasing reliance on AI to drive operational improvements and employee performance.

Cybersecurity remains a priority

Along with AI, cybersecurity remains a primary concern, with 43% of respondents citing it as the foremost challenge for IT departments. Based on the survey, 45% of IT service providers consider cybersecurity the top area to add or change solutions in the next budget cycle.

This includes investments in security awareness training (45%), email security (43%), penetration testing (36%) and vulnerability scanning (35%). 

Proactive approach

Demonstrating the critical importance placed on ensuring robust cybersecurity measures within organisations

The cybersecurity investments by IT service providers underscore their proactive approach to identifying and mitigating vulnerabilities.

Half of the respondents prioritise increasing their budget for IT security over other areas, such as AI for IT efficiency and end-user productivity, demonstrating the critical importance placed on ensuring robust cybersecurity measures within organisations.

Focus on automation and completeness

Consistent data from 2023 to 2024 shows that businesses value the efficiency and productivity of tools, stressing the completeness of solutions.

Specifically, 42% of respondents advocate prioritising the efficiency of IT processes, a trend that has been steadily increasing over the past three years.

All-in-one solutions

Moreover, emphasis was placed on the completeness of solutions, with almost half of the respondents (42%) indicating a strong preference for all-in-one solutions that can manage multiple tasks and processes without requiring multiple tools, and 21% saying they prioritise access to comprehensive IT documentation, reflecting the need for centralised and easily accessible information.

The focus on deep integration tools was down sharply from years past, suggesting that companies may have reached a satisfactory integration level or are adopting more comprehensive solutions that require less integration effort.

Economic concerns and shorter vendor contracts

40% of respondents have displayed a growing inclination toward shorter contract periods with vendors

Most respondents expect that ongoing economic uncertainty will primarily affect spending on software (39%), hardware (36%), and headcount (26%).

Furthermore, 40% of respondents have displayed a growing inclination toward shorter contract periods with vendors. This shift might stem from volatile economic conditions, where shorter, more adaptable contracts may mitigate long-term risks. Additionally, this shift suggests a desire for greater control and agility in responding to emerging challenges and opportunities.

Methodology

Kaseya’s 2024 The Future of IT Survey Data is based on statistics pulled from a survey of hundreds of IT service providers worldwide.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Security management
  • Security devices
  • Security installation
  • Security monitoring system
  • Asset tracking
  • Security service
  • Integration software
  • Cyber security
  • Border Security
  • Data Security
  • Home automation
  • Artificial intelligence (AI)
  • Machine Learning
  • Related links
  • Control Software CCTV software
  • Detection Software CCTV software
  • Drawing Software CCTV software
  • IP Surveillance Software CCTV software
  • Management Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Related categories
  • CCTV software
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec