Cybersecurity & Networking

  • Cyber-threat Intelligence Programs

    Cyber-threat intelligence is analyzed information about cyber-threats that helps inform cybersecurity decision making. Although security professionals recognize the value of cyber-threat intelligence, many organizations still consume it on a superficial basis.

    Learn more about these trends with the infographic, Cyber-threat Intelligence Programs.

  • End-to-end Networking Visibility and Management

    Research Objectives

    Organizations are distributing applications across private data centers, multiple public clouds, and edge locations. Plus, hybrid work initiatives are enabling employees to work from home or other locations outside of traditional office settings. As a result, the network has become critical to ensuring secure connectivity. These modern, distributed networks create greater challenges for organizations as they can create blind spots and become operationally complex to effectively manage. In addition, organizations are exploring the use of new technologies that drive visibility, efficiency, and automation.

    To better understand how organizations are addressing end-to-end network visibility and management as well as adopting new technologies to drive greater operational efficiencies, Enterprise Strategy Group surveyed 339 IT and networking professionals responsible for network operations, architecture, and management at organizations in North America (US and Canada).

    This study sought to answer the following questions:

    • Approximately how many unique public cloud infrastructure service providers do organizations currently use?
    • Approximately how many remote offices/branch offices do organizations operate worldwide today, and how do they expect this to change over the next 24 months?
    • Approximately what percentage of organizations’ total employees are roaming users, and how do they expect this to change over the next 24 months?
    • What is the breakdown of where production applications and workloads run today, and how is this expected to change over the next 24 months?
    • What are the biggest reasons that organizations believe end-to-end network environments have become more complex?
    • How important do organizations believe it is to have unified end-to-end visibility of network environments? Why is unified end-to-end visibility viewed as important?
    • What challenges have organizations encountered, or what concerns do they have, with unifying network visibility capabilities? What benefits have organizations achieved, or do they expect to achieve, by unifying their end-to-end network visibility capabilities?
    • How important do organizations believe it is to have unified end-to-end management of network environments? Why is unified end-to-end management viewed as important?
    • What challenges have organizations encountered, or what concerns do they have, with unifying network management capabilities? What benefits have organizations achieved, or do they expect to achieve, by unifying their end-to-end network management capabilities?
    • How important is digital twin technology, or will it be, for the visibility and management of organizations’ end-to-end network environments?
    • To what extent are organizations using network automation technology? To what extent do organizations’ network automation solutions leverage AI/ML capabilities?
    • In which network domains are organizations currently using, or planning to use, network automation? What are, or likely will be, the most common uses for network automation?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The Cloud Data Security Imperative

    Research Objectives

    Examine the impact of the public cloud on data security priorities.
    Determine the degree of separate versus unified approaches for cloud and on-premises data sets.
    Gain insight into top data security challenges and rate data loss from the cloud.
    Establish data security spending intentions and priorities.

    (more…)

  • Managing the Endpoint Vulnerability Gap

    Research Objectives

    Identify challenges, strategies, and trends in endpoint management and security.
    Determine if and how endpoint management and security functions and systems are converging.
    Highlight opportunities for improving endpoint management and security fueled by functional convergence.

    (more…)

  • Network Threat Detection Response Trends

    Research Objectives

    Gain insights into the challenges security teams face with the current threat detection and response landscape.
    Gauge the key capabilities organizations require from NDR tools and the use cases they are seeking to address.
    Examine how NDR tools are used today and where they fit into broader XDR plans and strategies.
    Understand why security teams are prioritizing NDR and the benefits they are seeing.

    (more…)

  • Top RSA Conference 2023 Trends and Topics

    endpoint_security_suiteTaking inspiration from the words of Helen Keller, “Alone we can do so little; together we can do so much,” the theme for RSA Conference 2023 is “Stronger Together.”

    (more…)

  • Cloud Entitlements and Posture Management Trends

    Research Objectives

    Ascertain key cloud adoption trends that drive the need for CSPM and CIEM solutions.
    Determine the top challenges organizations face in managing cloud security posture and infrastructure entitlements.
    Validate top requirements for CSPM and CIEM solutions.
    Highlight key roles involved in evaluating and purchasing solutions. (more…)

  • Research Objectives

    The potential for serious business disruptions makes detecting threats quickly and accurately critical to preventing data loss, compliance violations, and lost revenue. Even as resources and users leave the traditional perimeter, the network should play a key role in detecting threats to avoid business disruption. Specifically, network-based tools provide consistent, comprehensive visibility across distributed, heterogeneous environments and remain outside the scope of attacker manipulation. Yet the number of threat detection and response tools that are available can leave users unsure of where to prioritize.

    In order to gain insight into these trends, Enterprise Strategy Group surveyed 376 IT, cybersecurity, and networking professionals responsible for evaluating, purchasing, and managing network security products and services for their organizations.

    This study sought to answer the following questions:

    • What challenges do organizations face with threat detection and response today?
    • In which part of the MITRE ATT&CK framework do organizations have the most difficulty detecting and stopping threats?
    • Have organizations ever fallen victim to an attack that used encrypted traffic to avoid detection? How did the attack use encryption?
    • What technologies do organizations believe are most effective for threat detection and response?
    • What are the primary reasons organizations use, or plan to use, network detection and response tools? How do organizations use or plan to use NDR for threat detection?
    • What specific use cases do, or will, organizations support through their use of NDR tools?
    • What attributes are most important to organizations in an NDR solution?
    • What benefits have organizations realized as a result of using NDR?
    • How do organizations weigh, or expect to weigh, artificial intelligence when selecting an NDR tool? For what reasons would organizations leverage artificial intelligence/machine learning capabilities with their NDR solutions?
    • What plans do organizations have to use XDR technology? How do organizations expect to consume NDR as part of their XDR strategy?
    • How do organizations expect their spending on network detection and response technologies, services, and personnel to change over the next 12 to 18 months?
    • Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • What Security Teams Want from MDR Providers

    Research Objectives

    The use of managed detection and response services has become a mainstream strategy in modern security programs. But IT organizations shouldn’t be fooled by the name: MDR providers are delivering much more than basic detection and response, helping IT and security leaders accelerate program development and improve security posture. With no end in sight for the cybersecurity skills shortage, MDR services can bring immediate expert resources online, together with proven, best-of-breed processes and tools that can help security teams gain control and set themselves up for future security program success.

    In order to understand these trends, as well as assess the general state of managed detection and response service offerings, Enterprise Strategy Group surveyed 373 cybersecurity professionals personally involved with cybersecurity technology, including products, services, and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Web applications are critical resources for companies conducting business with their clients. These companies can’t afford to have these applications unavailable or compromised due to a cyber-attack. As a result, most organizations have made web application security one of their top cybersecurity priorities, and in many cases, the top priority. In doing so, companies are transitioning away from dedicated security tools that are proving to be inadequate in preventing attacks on multiple fronts. Integrated web application and API security protection (WAAP) platforms are fast becoming an attractive option for organizations.

    (more…)

  • The Market Moves Toward WAAP

    Business applications are the lifeblood of enterprises. Protecting them from various forms of attacks are first and foremost on the minds of security teams. Dedicated application security tools designed to prevent specific types of attacks are proving inadequate and contributing to tool sprawl. As a result, the security market is moving toward integrated web application and API protection (WAAP) platforms that combine four critical types of protection: WAF, DDoS mitigation, bot management, and API security.

    (more…)

  • SOC Modernization Priorities

    In the face of an increasingly complex threat landscape and acute shortage of cybersecurity professionals, security teams spend a large portion of their time on emergency issues instead of on continuous improvement of security strategy. Organizations are taking steps to bolster operations with the use of advanced analytics, a wider application of the MITRE ATT&CK framework, and increased utilization of managed security services. Security professionals also report that their organizations still need more investment in personnel, technology, and services. The upshot: Security spending will continue to increase in 2023, regardless of economic pressures.

    (more…)