Hype Cycle for Threat-Facing Technologies, 2018

Published: 13 July 2018 ID: G00338539


Purchase this Document

Price: $1,995.00 USD (PAGES: 60)

To purchase this document, you will need to register or sign in above.


Threat-facing technologies aim to prevent and protect IT systems and applications from attack, enabling fast and effective response. Technologies included meet the security needs of end users who utilize cloud and enterprise infrastructure that is threatened by the evolving threat landscape.

Table of Contents

  • Analysis
    • What You Need to Know
    • The Hype Cycle
    • The Priority Matrix
    • Off the Hype Cycle
    • On the Rise
      • Breach and Attack Simulation
      • Managed Detection and Response
      • Browser Isolation
      • Deception Platforms
      • Security Orchestration, Automation and Response (SOAR)
    • At the Peak
      • Firewall as a Service
      • Data Classification
      • File Analysis
      • Hardware-Based Security
      • Format-Preserving Encryption
    • Sliding Into the Trough
      • Network Traffic Analysis
      • Threat Intelligence Platforms
      • TLS Decryption Platform
      • Network Security Policy Management
      • User and Entity Behavior Analytics
      • Endpoint Detection and Response
      • Operational Technology Security
      • Enterprise Key Management
      • Secure Web Gateways
      • Software-Defined Security
    • Climbing the Slope
      • Enterprise Firewalls (Next-Generation Firewalls)
      • Microsegmentation (Software-Defined Segmentation)
      • Network Sandboxing
      • DDoS Defense
      • Network Access Control
      • SIEM
      • Web Application Firewalls
      • IDPS
      • Database Audit and Protection
      • Self-Encrypting Mass Storage Drives
    • Entering the Plateau
      • Database Encryption
      • Endpoint Protection Platforms
      • Network Penetration Testing Tools
      • UTM
      • Vulnerability Assessment
      • Application Control
    • Appendixes
      • Hype Cycle Phases, Benefit Ratings and Maturity Levels
  • Gartner Recommended Reading
© 2018 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartners research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

Why Gartner

Gartner delivers the technology-related insight you need to make the right decisions, every day.

Find out more

Call +1 855-515-4486 or contact us

to become a Gartner client.