Gartner Hype Cycle Report Highlights Security Operations Technologies

December 17, 2020

Rapid adoption of emerging technologies continues to make businesses more efficient and seamless. Unfortunately, it also makes them prone to a greater number of cyberthreats and exposes them to more vulnerabilities. To better protect organizations, a wide array of security operations technologies has hit the market.

Leading analyst Gartner explores the capabilities and benefits of these technologies and solutions in its 2020 Hype Cycle for Security Operations report. It offers key insight for security teams and leaders as they further develop their security strategies in the wake of new security needs as a result of the Covid pandemic, as well as in response to the constant risks and threats that come with digital transformation in general.

One thing to keep in mind: While we all would like to rely on these technologies on their own, a “set it and forget it” solution is nowhere on the horizon, and skilled cybersecurity professionals are a must for organizations of every size.

Gartner emphasizes that “in fact, the idea of a truly automated solution is unlikely to manifest itself in its entirety due to the pace of IT and the innovative nature of the adversary.”

Image of a digital blue key with binary numbers above it.

17 Security Operations Solutions Covered in All

Gartner details the applications, business impact, market penetration, and other key areas of 17 different technologies and services that mitigate threats and reduce risk. The report includes a priority matrix, which presents a timetable for adoption for the security operations solutions included in the report and gives readers an idea of where organizations are prioritizing their current IT security budgets and how long it will take for these technologies and services to go mainstream.

Among the security operations categories it covers are several for which Arctic Wolf provides solutions. One of these—managed detection and response (MDR) for 24x7 monitoring, threat detection, and response capabilities against modern cyberthreats—"continue(s) to see increased market awareness and adoption by buyers ranging in size from midsize enterprises (MSE) to larger enterprises.”

Other security operations technology and service solutions covered include:

Breach and attack simulation (BAS) technologies, which allow enterprises to continually and consistently simulate multiple attack vectors against enterprise infrastructure. These simulations mirror those of external and insider threats, lateral movement, and data exfiltration. 

Integrated risk management (IRM), described by Gartner as practices and processes supported by a risk-aware culture and enabling technologies that improve decision making and performance through an integrated view of how well an organization manages its unique set of risks.

Endpoint Detection and Response (EDR) solutions, which provide capabilities to detect and investigate security events, contain the attack and produce guidance for remediation. EDR solutions must identify and analyze activity and device configuration. Visibility and reporting of user and device activity are combined with direct intervention when abnormal activity is detected.

Create a Security Operations Path for Your Organization

A security operations approach to cybersecurity is becoming a great necessity as threats become more sophisticated and devices proliferate and enlarge the attack surface. So, for insight into the above solutions and more than a dozen others, download Gartner’s 2020 Hype Cycle for Security Operations today.

Previous Article
Seeking CMMC Compliance? Arctic Wolf Offers Insight
Seeking CMMC Compliance? Arctic Wolf Offers Insight

By 2025, all DoD suppliers will need to achieve at least Level 1 CMMC compliance to continue doing business...

Next Article
Inside the Wolf Den: Enhancing the Security Posture of Freeman Health System
Inside the Wolf Den: Enhancing the Security Posture of Freeman Health System

Inside the Wolf Den highlights how Freeman Health System explored challenges the healthcare organization fa...


Get cybersecurity updates delivered to your inbox.

First Name
Last Name
Yes, I’d like to receive marketing emails from Arctic Wolf about solutions of interest to me.
I agree to the Website Terms of Use and Arctic Wolf Privacy Policy.
Thanks for subscribing!
Error - something went wrong!