Gartner’s Top 10 Technologies for Information Security

How information security teams provide the most effective business support and risk management.

Modern information security teams encounter challenges unique to the current business environment. While the main goal of the team is to support emerging digital business, they’re also dealing with an increasingly advanced threat environment. At the Gartner Security & Risk Management Summit, Neil MacDonald, vice president at Gartner, spoke about the latest technology trends for 2016 that allow information security teams to provide the most effective business support and risk management.

The CIO Executive Communication Guide

Speak the language of the C-suite to communicate the business value of IT

Download eBook
  1. Cloud Access Security Brokers
    Software as a Service (SaaS) apps, increasingly pervasive in enterprises, provide new challenges to security teams with their limited visibility and control options. Cloud Access Security Brokers (CASB) allow chief information security officers (CISOs) an opportunity to apply enterprise security policies across multiple cloud services.
  2. Endpoint Detection and Response
    Endpoint detection and response (EDR) solutions allow CISOs to detect potential security breaches and react quickly. These tools record endpoint and network events, and the data is continuously searched using known indicators of compromise (IOC) and machine-learning techniques for early identification of breaches.
  3. Nonsignature Approaches for Endpoint Prevention
    Techniques such as memory protection and exploit prevention and machine learning-based systems, which uses mathematical models, augment ineffective signature-based approaches for malware prevention against advanced and targeted attacks.
  4. User and Entity Behavioral Analytics
    User and entity behavioral analytics (UEBA) provide user-centric analytics alongside information about networks, endpoints, and applications. The correlation of these analytics offers more effective, accurate threat detection.
  5. Microsegmentation and Flow Visibility
    Microsegmentation, a more granular segmentation, stops attackers already in the system from moving laterally (“east/west”) to other systems. Visualization tools allow security teams to understand flow patterns, set segmentation policies and monitor for deviations. For data in motion, some vendors provide optional encryption of the network traffic.
  6. Security Testing for DevOps
  7. As DevOps integrates security into the workflow (DevSecOps) emerging operating models offer an automated, transparent and compliant configuration of underlying security infrastructure based on policy reflecting the currently deployed state of the workloads.
  8. Intelligence-Driven Security Operations Center Orchestration Solutions
    Intelligence-driven security operations centers (ISOCs) are designed to deal with the new “detection and response” paradigm. This solution requires the evolution of traditional security operation center (SOCs) to offer an adaptive architecture and context-aware components.
  9. Remote Browser
    CISOs can address malicious malware delivered via email, URLs or websites by isolating the browsing function from the endpoint and corporate network. This is done by remotely presenting the browser session from an on-site or cloud-based “browser server.” The server sessions can be reset to a known good state, and this technique reduces the surface area for an attack, shifting the risk to server sessions.
  10. Deception
    Deception tools, as the name implies, use deceit or tricks to thwart attacks. The security team creates fake vulnerabilities, systems, shares and cookies to tempt attackers. Any real attack on these resources indicates to security teams an attack is occurring, as legitimate users won’t see or need access to the fake systems.
  11. Pervasive Trust Services
    Security models must evolve alongside the projected pervasiveness of the Internet of Things (IoT) and increasing dependency on operational technology. Trust services can manage the needs of billions of devices with limited processing capability. More importantly, trust services are designed to scale and can offer secure provisioning, data integrity, confidentiality, devices identity and authentication.

pecial Report
Cybersecurity is the foundation of digital business and innovation. Learn more in the Cybersecurity at the Speed of Digital Business special report, by Neil MacDonald, et al.

Learn about current security and risk governance best practices in the Governing Risk and Security in the Digital Business webinar.

Get Smarter

Gartner Security & Risk Management Summits

The latest insights on IT trends, evolving security tech and the ever-changing threat landscape.

Explore Gartner Conferences

2019-2021 Emerging Technology Roadmap for Large Enterprises

We gathered expertise from IT professionals across 198 organizations to benchmark adoption stages and risk and value factors for 108 infrastructure and operations technologies for this year. The emerging technologies profiled are spread across six technology buckets: compute and storage, compute and storage (cloud), digital workplace, IT automation, network and security.

Read Free Gartner Research


Get actionable advice in 60 minutes from the world's most respected experts. Keep pace with the latest issues that impact business.

Start Watching