Intelligent and Automated Security Controls Impact the Future of the Security Market

Archived Published: 30 October 2015 ID: G00290098


Purchase this Document

Price: $195.00 USD (PAGES: 16)

To purchase this document, you will need to register or sign in above.


Product leaders need insights into the expansion of threat intelligence and adaptive security capabilities across the security market. These new emerging capabilities will be instrumental in defining the future of adaptive security and how incident response automation will evolve into the future.

Table of Contents

  • Analysis
    • The Future of Intelligence-Aware Security Controls
    • Intelligence Awareness Moves Beyond SIEM to Intelligence-Led Detection and Adaptive Response
    • Key Trends
      • Threat Intelligence, Community Intelligence Sharing and Context-Aware Security Trends Continue as Emerging Areas of Buyer Interest
      • Automating Triage and Response Becomes Attractive to Some Buyers
      • Issues of Threat Intelligence Accuracy, Freshness, Validity and Privacy Concerns Persist
      • Incorrectly Automating Still Seen as a Career-Limiting Move by Security Practitioners, but Some See a Data Breach as Worse
  • Impacts and Recommendations
    • Third-party intelligence-sharing partnerships continue to expand to address detection weaknesses and context gaps in provider solutions, further commoditizing provider-only threat intelligence feeds
    • Security provider cross-product integrations have emerged to automate threat triage, response and mitigation efforts, which further entice customer buying against those lacking solid ecosystem integrations
    • Intelligent, adaptive security controls will require security solution providers to leverage threat intelligence standards and application programming interfaces (APIs) to avoid costly research and development investments and efficiently add automation capabilities
    • Product leaders must realize threat intelligence platforms have emerged at the confluence of intelligence sharing and intelligence-aware adaptive-defense solution integrations as the "pipelines" for sharing and orchestration
  • Gartner Recommended Reading
© 2015 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartners research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

Why Gartner

Gartner delivers the technology-related insight you need to make the right decisions, every day.

Find out more

Call +1 800 213 4848 or contact us

to become a Gartner client.