Gartner Research

Hype Cycle for Information Security, 2005

Published: 05 July 2005

ID: G00128160

Analyst(s): Vic Wheatman, John Girard, Greg Young, Ant Allan, John Pescatore, Kelly Kavanagh , Mark Nicolett, Neil MacDonald , Arabella Hallawell, Kristen Noakes-Fry, Avivah Litan , Rich Mogull, Clare Hirst, Lawrence Orans, Roberta Witty

Summary

New security threats continue to arise almost daily. This Hype Cycle will help you decide how to invest your limited security funds.

Table Of Contents
  • The Hype Cycle
  • On the Rise
    • SSL Peer-to-Peer, Site-to-Site Virtual Private Networks
    • Database Security
    • Anti-Phishing
    • HIPS on PCs
    • Content Monitoring and Filtering
    • Role Planning, Audit and Compliance
  • At the Peak
    • NAC
    • Instant Messaging Security
    • HIPS on Servers
    • Vulnerability Management
    • Data-at-Rest Encryption Appliances
    • Deep Packet Inspection Firewalls
    • Security Compliance Tools
    • Biometrics
  • Sliding Into the Trough
    • SIM/SEM
    • E-Mail Encryption
    • Trusted Computing Group
    • WPA Security
    • Digital Rights Management (Enterprise)
    • Public Key Operations
    • Enterprise Federated Identity
    • Managed Security Service Providers
  • Climbing the Slope
    • Web Services Security Standards
    • E-Signatures
    • Patch Management
    • User Provisioning
    • Secure Sockets Layer Remote Access VPNs
    • Spam Filtering
  • Entering the Plateau
    • Smart Tokens
    • Enterprise Reduced Sign-On
    • Secure Sockets Layer/Transport Layer Security
    • Hardware Tokens
  • Appendix A: Previous Iteration of the Hype Cycle
  • Appendix B: Hype Cycle Phases, Benefit Ratings and Maturity Levels

©2020 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Purchase this Document

To purchase this document, you will need to register or sign in above

Become a client

Learn how to access this content as a Gartner client.