Insight from The 2020 Gartner Market Guide for Managed Detection and Response Services

September 2, 2020

Awareness and visibility of the MDR market is growing at an incredible pace. In fact, Gartner has observed a 44% growth in MDR-related questions in end users' queries over the past 12 months. It's not hard to see why.

MDR services are designed to reduce the time to detect and respond to threats. And with cyberattacks growing in number—and industries of every type finding themselves at greater risk—organizations have found it imperative to find effective ways to adapt to the modern threat landscape. 

Why MDR Services Have Grown in Popularity

MDR services are valuable for today's organizations because they add remotely delivered, 24/7 security operations center (SOC) functions. Delivered with a turnkey approach, they provide robust security in a faster and more affordable manner compared to building out a security operations center in-house. MDR is often used when an organization currently has no internal capabilities, or when they need to accelerate or enhance their existing capabilities. 

However, due to a number of new MDR providers emerging to meet the growing market demands, many organization's don't know where to begin to enhance their security posture. But there's a great place to start. 

Gartner's Market Guide for Managed Detection and Response

Providing a current look at the state of MDR, Gartner has released their 2020 findings to give organizations detailed information on if managed detection and response would be a good fit for their security efforts.

Among this year's key findings: 

  • The number of MDR providers continues to grow at an accelerated pace, making the market more competitive than ever.
  • MDR buyers have found it challenging to differentiate between the different technologies and approaches offered by providers. 
  • While coverage for cloud services  has improved over the past year, it's still a work in progress for a number of MDR service providers. 

Circuit board highlighting yellow and green lines running parallel to each other.

With so many new choices for MDR, it's important to find a provider who is able to meet the unique needs of your organization. But where do you start? 

What to Look for in an MDR Provider 

  • Consider managed security service providers that offer MDR services when security technology and device management and compliance use cases are required.  
  • Ensure your MDR providers technology stack fits well with your existing security controls and IT environment, from on-premises to cloud. 
  • Choose an MDR provider who have experience with organizations who are similar to yours in size, industry, and location. 

The Gartner guide also provides additional steps for what makes a great MDR service, along with further capabilities to keep in mind to discover and implement the most successful security outcomes for your organization. 

According to Gartner, by 2025, 50% of organizations will be using MDR services. 

Additional Findings in the Market Guide for Managed Detection and Response Services 

  • How MDR services fill gaps and augment existing IT teams 
  • Recommendations and best practices for security leaders in considering MDR solutions 
  • The increasing importance of cloud monitoring for organizations 
  • Key differences between MDR and managed security service providers (MSSPs) 
  • The most common components leveraged by a full technology stack provider 
  • Why many customers fail with their threat monitoring, detection and response initiatives, 

For all this more information and more, download Gartner's Market Guide for Managed Detection and Response Services

 

 

 

Previous Article
COVID Threat Roundup: August 2020
COVID Threat Roundup: August 2020

The August Covid Threat Roundup highlights a phishing attack imitating major companies, business ID thefts,...

Next Article
Securing the Cloud: Why SIEM Is Not Right for SaaS Security
Securing the Cloud: Why SIEM Is Not Right for SaaS Security

While SIEM technology is a useful tool for many organizations, it also has limitations and disadvantages yo...

×

Get cybersecurity updates delivered to your inbox.

First Name
Last Name
Company
Country
Yes, I’d like to receive marketing emails from Arctic Wolf about solutions of interest to me.
I agree to the Website Terms of Use and Arctic Wolf Privacy Policy.
Thanks for subscribing!
Error - something went wrong!