Cybersecurity

  • Threats, exposures, and assets are growing exponentially, leaving security operations and threat and exposure management capabilities behind. Technology to support continuous cybersecurity data collection, AI-driven analysis of complete cybersecurity context, and issue remediation via autonomous agents are all mandatory for security organizations that want to stay ahead of their growing risk profile. To continue to improve, teams must build automated security programs while breaking down the silos that exist between isolated tools and multiple security and technology owners. Enterprise Strategy Group recently surveyed IT and cybersecurity decision-makers to gain insights into these trends.

    To learn more, download the free infographic, The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management.

  • Threats, exposures, and assets are growing exponentially, leaving organizations’ security operations and TEM capabilities behind. Technology to support continuous cybersecurity data collection, AI-driven analysis of complete cybersecurity context, and the ability for autonomous agents to remediate issues quickly are all mandatory if security organizations desire to stay ahead of their growing risk profile.

    Risk reduction is difficult, and homegrown technology solutions to the problem are becoming unmanageable. Security teams must move beyond continuously finding more issues that they don’t have the capability to fix and instead focus on creating automated and scalable remediation systems. To continue to improve, organizations must build automated security programs while breaking down the silos that exist between existing isolated tools and multiple security and technology owners.

    To gain further insight into these trends, Enterprise Strategy Group surveyed 400 IT and cybersecurity decision-makers at organizations in North America (U.S. and Canada) involved with or responsible for discovering and reducing threats and vulnerabilities in their organizations.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • This Complete Survey Results presentation focuses on the current state of threat and exposure management technologies and processes, including continuous cybersecurity data collection, AI-driven analysis of complete cybersecurity context, and issue remediation via autonomous agents, as well as the collaboration, or lack thereof, between IT and security teams.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • SD-WAN and security technologies have been converging via SASE to simplify the infrastructure stack and deliver better experiences and protection for users. However, questions remain as to how quickly organizations are acting to tightly couple both networking and security tools and teams. While convergence has an appealing value proposition, it can be difficult to implement in practice. Enterprise Strategy Group recently cybersecurity, networking, and IT professionals to gain insights into these trends.

    To learn more, download the free infographic, Networking and Security Convergence: Assessing SASE Progress and Best Practices.

  • SD-WAN and security technologies have been converging via SASE to simplify the infrastructure stack and deliver better experiences and protection for users. However, questions remain as to how quickly organizations are acting to tightly couple both networking and security tools and teams. Network and security organizations have different objectives, KPIs, workflows, and vendor preferences. Taken together, this means that while convergence has an appealing value proposition, it can be difficult to implement in practice. Networking and security leaders need to understand where their forward-thinking peer organizations are in this process to plan accordingly and, ultimately, solve the key business challenges they face.

    To gain insights into these trends, Enterprise Strategy Group surveyed 428 cybersecurity, networking, and IT professionals in North America (U.S. and Canada) involved with SASE technology and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • This Complete Survey Results presentation focuses on the challenges organizations face maintaining separate networking and security teams and tools and the subsequent desire to merge these functions, as well as the drivers, use cases, and key attributes organizations associate with SASE.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Preparing Legacy Apps for a Post-quantum World

    Enterprises need to plan for a post-quantum world and face the daunting task of enabling post-quantum support for legacy apps. As organizations plan for quantum computing and need a solution to modernize their cryptography approach for data in motion, they can look to Palo Alto Networks for a path to the post-quantum world for apps that cannot be upgraded or support Post-Quantum Cryptography (PQC).

    To learn more, download the free brief, Preparing Legacy Apps for a Post-quantum World.

  • Enterprises want to embrace AI but are reluctant to deploy AI apps due to the potential for data loss. Harmonic Security helps enterprises safely deploy AI apps with controls designed to deliver precise protection against data loss.

    To learn more, download the free brief, Addressing the Challenges of Securing GenAI Adoption With Harmonic Security.

  • AI is impacting virtually every aspect of technology and operations, and security operations and the use of MDR services are no exception. While AI-enabled security solutions are poised to change the way security programs operate, they are also impacting the types of managed security services and the use of MDR services as they exist today. With a hypothesis that the AI-era could reduce the need for and consumption of MDR services as AI-enabled security solutions automate more security functions, this research looked to uncover new opportunities for an expanding MDR market as well as the need for a rapid increase in skills and services to support that expansion.

    To understand more about how AI is impacting the expectations of, utilization of, and services offered by MDR providers, Enterprise Strategy Group surveyed 400 cybersecurity and IT decision-makers at organizations in North America (U.S. and Canada) responsible for evaluating or purchasing MDR security services.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • This Complete Survey Results presentation focuses on the state of managed detection and response (MDR) service offerings, including AI’s impact on MDR in terms of how organizations use third-party help securing AI workloads and how organizations expect MDR providers to leverage AI to enhance security services.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Organizations face challenges managing the controls they have in place to prevent data loss, especially when it comes to the volume of alerts. Indeed, resource-strapped cybersecurity teams often lack the time to go through the barrage of alerts generated by DLP tools and platforms or the necessary context to quickly disposition alerts. Recent research by Enterprise Strategy Group examined how IT and cybersecurity professionals are navigating challenges with DLP alert management.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Typically a prerequisite for data loss prevention (DLP) strategies, data classification tools allow organizations to determine data’s sensitivity, label data accurately, and apply proper access controls to a variety of data sets. Recent research by Enterprise Strategy Group investigated how organizations are managing data classification in today’s data-intensive operational environments.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us