Cybersecurity

  • Organizations require comprehensive contextual prioritization and automated remediation of security vulnerabilities to scale their limited human cybersecurity resources effectively. At the Zscaler event, Zenith Live, the company showcased this vision, illustrating a platform that employs large-scale data collection, contextual AI data analysis, and intelligent automated security control implementation to mitigate risk and advance toward a self-healing system.

    To learn more, download the free brief, Zscaler Showcases Innovation With Contextual Analysis and AI-driven Remediation at Zenith Live.

  • Demands for breakneck speed in application development certainly aren’t going away in increasingly competitive business environments. However, teams that do so at the expense of robust cybersecurity practices threaten the viability of their organization when a successful attack on any application can compromise the business. Recent research by Enterprise Strategy Group investigated how organizations are incorporating security into application development processes, especially amid rapid cloud-native application development conditions.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • IT professionals, application developers, and cybersecurity teams all play critical roles in ensuring timely and secure development and deployment of cloud-native applications. However, these teams do not always have the same perspective on the practices, roles, and tool strategies that will best accomplish those goals. Recent research by Enterprise Strategy Group revealed the differences in how these groups perceive DevOps and DevSecOps processes at their organizations today.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Gaps in cybersecurity skill sets, coverage, processes, and technology continue to plague many organizations today, and enterprises across industries are looking to AI and automation solutions to bridge many of these gaps. However, despite rapid advancement of AI technologies, recent research by Enterprise Strategy Group found that many organizations plan to leverage managed services for the foreseeable future to close gaps and accelerate program development.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Security operations is a core function of cybersecurity, requiring a combination of skilled people, refined processes, and scalable technologies. While once focused on more reactive security functions, modern security operations centers (SOCs) are increasingly responsible for more proactive security functions, including monitoring security posture and status, managing threats and exposure, and analyzing threat intelligence, while continuing to triage, investigate, and respond to suspicious or malicious behavior. Recent research by Enterprise Strategy Group investigated how the size of a SOC impacts the adoption of technologies such as GenAI, leveraging third-party services and increasing organizations’ spending to better support their security operations and fortify their security posture.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Enterprises need to provide access to sensitive data while controlling against the unauthorized disclosure of that information from inadvertent leakage, insider threats, and outside attacks targeting data. Work-from-home and bring-your-own-device initiatives pose increased data loss prevention (DLP) challenges, and generative AI (GenAI) has opened new avenues for data leakage. Although DLP is a top investment category when it comes to data security, enterprises continue to struggle to classify data and control against data loss. Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insights into these trends.

    To learn more, download the free infographic, Reinventing Data Loss Prevention: Adapting Data Security to the Generative AI Era.

  • Enterprises need to provide access to sensitive data while controlling against the unauthorized disclosure of that information from inadvertent leakage, insider threats, and outside attacks targeting data. Work-from-home and bring-your-own-device initiatives pose increased DLP challenges, and new collaboration platforms and GenAI applications have opened new avenues for data leakage. Additionally, the proliferation of cloud services poses threats for data exfiltration, while intellectual property and trade secrets take new forms that do not lend themselves to conventional DLP solutions.

    Although DLP is a top investment category when it comes to data security, enterprises continue to struggle to classify data and control against data loss. Whether an enterprise DLP solution or DLP functionality within another security technology, current offerings generate considerable false positive alerts that distract teams that must evaluate and respond to such alerts. Existing approaches relying on regular expression (regex) rules can be brittle and require considerable maintenance, while current DLP solutions frequently encounter scaling and performance issues. Furthermore, complex data types like software code or health sciences data can be difficult to categorize.

    To gain insights into these trends, Enterprise Strategy Group surveyed 370 IT and cybersecurity professionals in North America (U.S. and Canada) involved with identity security technologies and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • This Complete Survey Results presentation focuses on how organizations categorize and protect data and control against data loss across the enterprise attack surface, which includes the challenges of preventing unauthorized disclosure of sensitive data, the risk posed by today’s data loss prevention (DLP) solutions, and the impact of cloud services and generative AI technologies.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • As organizations today face pressure to boost their productivity and scale while efficiently optimizing resources, they are increasingly utilizing cloud services to deliver cloud-native applications. In recognition of the impact of security incidents on their cloud-native applications, cybersecurity teams need to look for ways to gain unified visibility and control to efficiently manage risk and rapidly respond to attacks by incorporating security into DevOps processes (DevSecOps) and utilizing cloud security platforms. Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals to gain insights into these trends.

    To learn more, download the free infographic, The State of DevSecOps and Cloud Security Platforms.

  • Today’s cybersecurity teams encounter issues such as fragmented tools, siloed data, and increased operational complexity, reducing their effectiveness in managing business and technology risks. Recent findings from Enterprise Strategy Group show a shift toward tool consolidation and the integration of cybersecurity data security fabrics and comprehensive platforms to tackle these challenges. This brief examines how consolidation and the emergence of AI capabilities are pushing the adoption of data fabrics.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • This Complete Survey Results presentation focuses on the scope of cloud-native application development environments, including the top challenges associated with securing cloud-native applications and the security solutions in place to protect cloud infrastructure and applications.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • As organizations today face pressure to boost their productivity and scale while efficiently optimizing resources, they are increasingly utilizing cloud services to deliver cloud-native applications. Cybersecurity teams recognize the impact of security incidents on their cloud-native applications, including application downtime, business disruption, compliance fines, and negative brand reputation. They need effective cybersecurity solutions that address security risk from development to deployment to ensure security teams can support business growth.

    The efforts to modernize application development utilizing cloud services are focused on optimizing efficiency for growth and scale. However, having separate, siloed security tools that work in different parts of the software development lifecycle works against the speed and efficiency that organizations are trying to achieve. As a result, organizations need to look for ways to gain unified visibility and control to efficiently manage risk and rapidly respond to threats and attacks by incorporating DevSecOps and utilizing cloud security platforms.

    To gain insights into these trends, Enterprise Strategy Group surveyed 373 IT, cybersecurity, and application development professionals in North America (U.S. and Canada) responsible for evaluating or purchasing cloud security technology products and services.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us