Gartner Research

Market Definitions and Methodology: Information Security and Risk Management Products and Services Forecast

Published: 06 August 2018

ID: G00368890

Analyst(s): Ruggero Contu , Deborah Kish, Dale Gardner , Avivah Litan , Sid Deshpande, John A. Wheeler , Elizabeth Kim , Justin Taylor


This document contains Gartner's updated definitions and methodology for information security. Technology and service providers should use this as a companion document for the information security forecast reports.

Table Of Contents

What You Need to Know


Notable Changes



High-Level Definitions and Segmentation

  • Application Security
    • Vulnerability Assessment
    • Application Security Testing
    • Web Application Firewalls
  • Identity and Access Management
    • Access Management
    • Privileged Access Management
    • Identity Governance and Administration
    • User Authentication
  • Infrastructure Protection
    • Endpoint Protection Platform (Enterprise)
    • Secure Email Gateway
    • Secure Web Gateway
    • Security Information and Event Management
    • Threat Intelligence
  • Data Security
    • Enterprise Data Loss Prevention
    • Encryption
    • Tokenization
  • Integrated Risk Management
    • Integrated Risk Management Solutions
  • Cloud Security
    • Cloud Access Security Brokers
  • Other Information Security Software
  • Consumer Security Software
  • Network Security Equipment
    • Firewall Equipment
    • Specialized Intrusion Prevention System (IPS) Equipment
  • Security Services
    • Hardware Support
    • Consulting
    • Implementation
    • IT Outsourcing (Security Outsourcing and Managed Security Services)

Gartner Recommended Reading

©2021 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Become a client

Learn how to access this content as a Gartner client.