74,110 Results found   |   Page 1 of 3,706

Gartner client? Log in for personalized search results.

Research December 21 2021
... Hype Cycle for Security Operations 2021 Effectively strategize and defend your IT systems from an attack by identifying threats. Security operations is not simply a department, team or set of technologies. It is a group of well-executed processes performed by personnel aiming to protect the organization ...
Research Oct 2021
... Security operations technologies and services defend IT systems from attack by identifying threats and exposure to vulnerability — enabling effective response and remediation. The innovations included in this Hype Cycle aim to help security and risk management leaders strategize effectively. Gartner ...

Analyst(s):   Pete Shoard
Research Jun 2020
... Integrated Risk Management IoT Security Network Detection and Response Operational Technology Security Climbing the Slope Endpoint Detection and Response SIEM Entering the Plateau Vulnerability Assessment Endpoint Protection Platforms Network Sandboxing Appendixes Hype Cycle Phases, Benefit Ratings and ...

Analyst(s):   Pete Shoard
Research Dec 2022
... Access Research Already a Gartner client? Just stopping by? Security and risk leaders must prepare to select next-wave technology to continue to protect endpoints from attacks and breaches. EDR remains a mainstream technology, while XDR advances adoption of new use cases and technologies such as UES, ...

Analyst(s):   Franz Hinner
Research April 05 2022
... Security Operations Primer for 2022 Make sure your service providers can deliver 24/7 and on-demand SecOps capabilities. Security and risk management (SRM) leaders need to: Identify the need for operational security Respond to cybersecurity incidents Select detection and response (SMDR) technologies ...
Research Feb 2022
... Choosing the right automation strategy for security operations is a balance between getting gains and investing in tools and development. This research explains how security and risk management technical professionals can implement automation into security operations. Overview Problem Statement The Gartner ...

Analyst(s):   Eric Ahlm
Research Nov 2022
... Access Research Already a Gartner client? Just stopping by? SIEM solutions are a security system of record with threat detection, investigation and response capabilities, often demanded as SaaS or cloud-native. Security and risk management leaders who require SIEM solutions should evaluate critical capabilities ...

Analyst(s):   Pete Shoard   |   Andrew Davies   |   Mitchell Schneider
... research topics for technical professionals to better understand — and importantly, to act now on — the new skills that will be required for the “new normal”: Infrastructure, operations, and cloud Data and analytics Cybersecurity Application architecture and development Technical Architect for digital business ...
Blog Post August 17 2022
... have no rules in place for detection and doing a historical search to determine if something bad has already hit you.  There is also an aspect of this using threat intelligence to look for things you cannot write a detection rule for and I think there is where the cyber security 1% start getting pedantic ...

Analyst(s):   John Collins
Research Sep 2021
... Organizations are accelerating the deployment of sensitive data across multicloud architectures, which exposes data beyond traditional network boundaries. This is scaling up the exposure to data residency and privacy risks, and a growth in ransomware and data breaches. Gartner Research ...

Analyst(s):   Brian Lowans
Premium Research Oct 2022
... Security and risk management leaders continue to need a security system of record with comprehensive threat detection, investigation and response capabilities. SIEM is evolving into a security platform with multiple features and deployment models. This research will help you find the right solution. ...

Analyst(s):   Andrew Davies   |   Pete Shoard   |   Mitchell Schneider
Research Dec 2022
... minimize enterprises’ exposure to present and future threats. Gartner predicts that threat exposure management will enable security and risk management leaders to build evidence-based security. Overview Strategic Planning Assumptions Analysis A Look Back Gartner Recommended Reading Gartner Research ...

Analyst(s):   Pete Shoard   |   John Watts   |   Jeremy D'Hoinne   |   Mitchell Schneider
Research Feb 2023
... client? Just stopping by? Effective sales operations leaders supply their commercial organizations with the resources, processes, analytics and decision support needed to succeed. Progressive leaders can optimize sales productivity by anticipating demand for data insights, as well as shifting talent ...

Analyst(s):   Steve Rietberg   |   Steve Herz   |   Greg Hessong
... information security leaders like you with the indispensable insights, advice and tools needed to advance your security operations and achieve the mission-critical priorities of your organization, beyond just the information technology practice. Adopt modern security perspective 2022 Leadership Vision for Cybersecurity ...
Research Feb 2023
... Access Research Already a Gartner client? Just stopping by? An effective marketing operations function ensures that work aligns to strategy and resources are allocated efficiently. Done right, it also delivers measurement of operational performance that enables the continuous improvement of marketing ...

Analyst(s):   Michael McCune
Research Mar 2022
... identifies over 60 providers of cloud security, data security, identity and access management, and security operations in China. Security and risk management leaders can use the individual tools to identify corresponding security providers. When to Use Directions for Use Recommended by the Authors Gartner ...

Analyst(s):   Anson Chen   |   Angela Zhao   |   Mia Yu   |   Feng Gao
Webinar On-Demand
... The rapidly changing business and technology landscape makes it difficult for infrastructure & operations (I&O) leaders to evaluate, select and adopt emerging technologies. I&O leaders must enable growth by helping to scale initiatives throughout their enterprise. Yet, they face significant external ...

Analyst(s):   Mark Margevicius   |   Nathan Hill
Research Aug 2021
... sign in above Security and risk management leaders seek to protect enterprise endpoints from attacks and breaches, and to offer efficient and secure remote access. As EDR matures and reaches wide adoption, XDR, UES, SSE and SASE emerge to offer ways to integrate stand-alone security solutions. Analysis ...

Analyst(s):   Chris Silva
Premium Research Apr 2022
... Threats are always evolving, so security operations must grow to detect and respond to them. This framework will help security and risk management technical professionals select the best testing method to improve detection and response capabilities or confirm the efficacy of what they already have. ...

Analyst(s):   Eric Ahlm
Research Nov 2021
... such as better threat detection than existing tools, and lower overall cost. This note examines the value and justification of XDR solutions to help security and risk management technical professionals determine if their organization could benefit from XDR, and how. Overview Analysis Guidance Gartner Recommended ...

Analyst(s):   Eric Ahlm   |   Jon Amato
of 3706
Security Orchestration, Automation and Response (SOAR)

... SOAR refers to technologies that enable organizations to collect inputs monitored by the security operations team. For example, alerts from the SIEM system and other security technologies — where incident analysis and triage can be performed by leveraging a combination of human and machine power — help ... Gartner Glossary

Access More

Speak with a Gartner specialist to learn how you can access peer and practitioner research backed by proprietary data, insights, advice and tools to help you achieve stronger performance.