It’s more important than ever to accurately assess underappreciated risk and threat vectors and to identify effective and efficient ways to address them.
Our latest research shows the average number of planned investments in Cybersecurity technology tops all other tech categories we studied.
We work closely with vendors and end users alike to stay up to date on how organizations are investing, what problems they’re trying to solve, and how the market is changing or adapting to the latest trends. Enterprise Strategy Group’s Cybersecurity analysts and research cover every aspect of an organization’s cybersecurity needs and lifecycle, including:
- Application security
- Cloud security
- Cyber risk management
- Data security
- Identity & access management
- Network security
- Security operations
- Threat detection & response
- User protection
Research Report
The Life and Times of Cybersecurity Professionals Volume VII
The seventh annual Life and Times of Cybersecurity Professionals study continues to pinpoint many of the same issues as past editions, underscoring persistent challenges such as rising cyberthreats, IT complexity, ubiquitous vulnerabilities, heavy workloads, and difficulties embedding cybersecurity into organizational processes and cultures. Beyond illustrating cybersecurity problems, this year’s edition highlights specific areas where cybersecurity […]
Analysts Covering Cybersecurity
John Grady
Principal Analyst, Network Security & Web Application Security
Areas of Expertise
- Bot Mitigation
- CASB
- DDoS
- Firewall
- IPS
- Microsegmentation
Dave Gruber
Principal Analyst, Ransomware, SecOps & Services
Areas of Expertise
- All Things Security Operations
- Leveraging AI in SecOps
- Managed Detection & Response
- MidMarket Cybersecurity Strategies
- Ransomware Security Strategies
- Security Analytics
Gabe Knuth
Senior Analyst, End-user Computing & User Protection
Areas of Expertise
- Desktop & App Virtualization (VDI)
- Desktop-as-a-Service (DaaS)
- Digital Employee Experience (DEX)
- Digital Workspaces
- Email Security
- End-User Devices & Hardware
Melinda Marks
Practice Director, Cybersecurity
Areas of Expertise
- API Security
- Application Security
- Cloud Security Posture Management
- Cloud Workload Protection Platforms
- Cloud-native Technologies
- Container Security
Aaron Tan
Regional Director, Analyst Services, APAC
Areas of Expertise
- Application Modernization & DevOps
- Business Applications
- Cloud Computing
- Cybersecurity
- DevOps
- IaaS/Cloud
Todd Thiemann
Senior Analyst, IAM & Data Security
Areas of Expertise
- AI & ML in Cybersecurity
- Data Loss Prevention
- Data Security Posture Management
- Encryption & Key Management
- Identity & Access Management (IAM)
- Identity Security Posture Management (ISPM)
Recent Cybersecurity Insights
Research Report | December 6, 2024
Managing Non-human Identities for an Effective Cybersecurity Program
Survey Results | December 6, 2024
Managing Non-Human Identities for an Effective Cybersecurity Program
Research Brief | December 6, 2024
Modern Cyber-risk Challenges Require Deeper Context, Automation, and Continuous Analysis
Infographic | December 2, 2024