![]() ![]() In response to the need for simplified security tool management and greater flexibility, cybersecurity mesh architecture (CSMA) has emerged on this year's Hype Cycle at Innovation Trigger, with a benefit rating of Transformational. Cybersecurity Mesh Architecture (CSMA) is on the Rise Taking this advice into account, this year's hype shows us why integrated security toolsets are becoming necessary to meet the balance between the sophistication of defenses and simplicity of use for security teams. While Gartner doesn't outright advocate against single-vendor solutions, they note among XDR obstacles that "although the list of vendors that offer a holistic XDR product on their own is short, committing to a single-vendor XDR approach could lead to tie-in." In other words (as we see it) Gartner is defining XDR as not a single solution, but as a strategy of integrated best-of-breed solutions. They also include security controls for, among other things, endpoint detection and response (EDR), cloud access security brokers (CASBs), firewalls, identity and access management, and intrusion detection systems." However, XDR products have higher levels of integration, automation, ease of use, and focus on threat detection and incident response. According to the Hype Cycle, "XDR products can be seen as evolutions and amalgamations of some of the security operations tools that preceded them. While XDR's position as an emerging cybersecurity trend is hardly surprising, we found Gartner's explanation of XDR's importance far more telling. ![]() XDR is placed on the Peak of Inflated Expectations on this year's Hype Cycle, with a high benefit rating. Read the Report: 2022 Gartner Hype Cycle for Security Operations Notable Trends from the Gartner Hype Cycle for Security Operations, 2022Įxtended Detection and Response (XDR) as a Strategy The emerging trends naturally toe the line between offering disparate data sources and diverse security tactics while streamlining, automating, or outsourcing the work of detection and response. To achieve this, security teams require security architecture and supporting technology that is both complex and comprehensive enough to take on today's threats, yet streamlined and easy enough to manage for today's resource-limited security organizations. It can be argued that the answer to successful security operations is a paradox: simple complexity. Security operations technologies and concepts must enable this greater visibility and control through decentralized management of security technologies and faster response that works cohesively across multiple vendor solutions to reduce risks for businesses." This is driven by the fast-paced development in consumer IT, hybrid scenarios for those with established infrastructure and the use of third-party SaaS platforms. Gartner expects that there will be an increasingly diverse set of exposures and risks that organizations need to gain better visibility and control over. ![]() Security operations technologies are designed to meet the diverse needs of modern organizations across these architectural challenges, while also trying to align to your specific organization's threat landscape. In this year's report, Gartner sums up today's SecOps challenges by saying "Organizations need to support a complex and sometimes competing array of approaches to security, while also supporting the growth of the organization via traditional IT infrastructure deployments, cloud-based deployments and hybrid approaches. Gartner Hype Cycles provide a graphic representation of the maturity and adoption of technologies and applications, and how they are potentially relevant to solving real business problems and exploiting new opportunities. To help, Gartner ® published Hype Cycle for Security Operations, 2022. Unfortunately, separating value from a market full of hype can be a long, confusing process. Security budget holders are under pressure to implement the right mix of technology to prevent breaches while minimizing the impact on budget and resources. In response, cybersecurity vendors are scrambling to innovate to stay relevant against today's threat landscape-but innovation in a high-stakes environment inevitably leads to hype. To adapt to today's threats, security teams have to continually evaluate new and established tools and technologies. Cybersecurity is a high-stakes game-and the opponents, today's advanced threats, aren't predictable, and they never play by the rules. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |