Rapid adoption of emerging technologies continues to make businesses more efficient and seamless. Unfortunately, it also makes them prone to a greater number of cyberthreats and exposes them to more vulnerabilities. To better protect organizations, a wide array of security operations technologies has hit the market.
Leading analyst Gartner explores the capabilities and benefits of these technologies and solutions in its 2020 Hype Cycle for Security Operations report. It offers key insight for security teams and leaders as they further develop their security strategies in the wake of new security needs as a result of the Covid pandemic, as well as in response to the constant risks and threats that come with digital transformation in general.
One thing to keep in mind: While we all would like to rely on these technologies on their own, a “set it and forget it” solution is nowhere on the horizon, and skilled cybersecurity professionals are a must for organizations of every size.
Gartner emphasizes that “in fact, the idea of a truly automated solution is unlikely to manifest itself in its entirety due to the pace of IT and the innovative nature of the adversary.”
17 Security Operations Solutions Covered in All
Gartner details the applications, business impact, market penetration, and other key areas of 17 different technologies and services that mitigate threats and reduce risk. The report includes a priority matrix, which presents a timetable for adoption for the security operations solutions included in the report and gives readers an idea of where organizations are prioritizing their current IT security budgets and how long it will take for these technologies and services to go mainstream.
Among the security operations categories it covers are several for which Arctic Wolf provides solutions. One of these—managed detection and response (MDR) for 24x7 monitoring, threat detection, and response capabilities against modern cyberthreats—"continue(s) to see increased market awareness and adoption by buyers ranging in size from midsize enterprises (MSE) to larger enterprises.”
Other security operations technology and service solutions covered include:
Breach and attack simulation (BAS) technologies, which allow enterprises to continually and consistently simulate multiple attack vectors against enterprise infrastructure. These simulations mirror those of external and insider threats, lateral movement, and data exfiltration.
Integrated risk management (IRM), described by Gartner as practices and processes supported by a risk-aware culture and enabling technologies that improve decision making and performance through an integrated view of how well an organization manages its unique set of risks.
Endpoint Detection and Response (EDR) solutions, which provide capabilities to detect and investigate security events, contain the attack and produce guidance for remediation. EDR solutions must identify and analyze activity and device configuration. Visibility and reporting of user and device activity are combined with direct intervention when abnormal activity is detected.
Create a Security Operations Path for Your Organization
A security operations approach to cybersecurity is becoming a great necessity as threats become more sophisticated and devices proliferate and enlarge the attack surface. So, for insight into the above solutions and more than a dozen others, download Gartner’s 2020 Hype Cycle for Security Operations today.