ESG Master Survey Results: The Impact of XDR in the Modern SOC

Abstract:

This Master Survey Results presentation focuses on the extension of EDR, NDR, and other security analytics solutions in support of broad threat detection and response programs via emerging XDR technology solutions.

Topics: Cybersecurity

ESG Brief: Juniper Enters 2021 Focused on Client-to-cloud Vision: Delivering Superior User Experiences for the AI-driven Enterprise

Abstract:

The global pandemic significantly impacted organizations last year in many different ways. The biggest was undoubtedly the swift transition to work-from-home programs and the need to stand up technology to enable this shift. As a result, many organizations reported that these efforts had dramatically accelerated their company’s digital transformation efforts. ESG research validates this acceleration and highlights that some of the top goals of organizations’ digital transformation initiatives are to drive greater operational efficiencies and deliver differentiated customer experiences. Therefore, it shouldn’t be a surprise that technology vendors are also accelerating their efforts to deliver solutions to enable greater operational efficiency to address the increasing complexity arising from a highly distributed IT environment. A great example of this vendor transformation can be seen in the steps taken by Juniper Networks.

Topics: Networking Data Platforms, Analytics, & AI

ESG Research Report: Cybersecurity in the C-Suite and Boardroom

Abstract:

As organizations embrace digital transformation initiatives, business outcomes become inexorably linked to technology areas like application development, cloud computing, and IoT devices. Therefore, these technology assets must be protected to ensure continuity of business operations. The link between cybersecurity and the business has led to an industry declaration that, “Cybersecurity is a boardroom issue.” This statement is true yet simplistic. Executives and corporate directors have a fiduciary responsibility to shareholders and/or owners, so they are ultimately responsible for everything that drives the business, including managing cyber-risk and safeguarding business-critical technology assets. That said, cybersecurity can be a highly technical discipline. This brings up a few questions: Do executives really understand cybersecurity and its role in the business? And as technology further dominates the business landscape, are they investing appropriately in cybersecurity and driving a cybersecurity culture throughout their organizations?

To explore the answers to these and other questions, ESG surveyed 365 senior business, cybersecurity, and IT professionals at organizations in North America (US and Canada) and Western Europe (UK, France, and Germany) working at midmarket (i.e., 100 to 999 employees) and enterprise-class (i.e., more than 1,000 employees) organizations

Topics: Cybersecurity

ESG Research Report: Trends in Identity and Access Management

Abstract:

The broad adoption of public cloud services demands a retooling of identity and access management programs. Perimeter security must evolve from a traditional castle and moat model to one that focuses on cloud identities inclusive of service accounts, as well as individual users and the data they access. To protect sensitive cloud-resident data, cybersecurity and IT operations teams need to work with their line-of-business teams on strengthening identity programs with both the user experience and risk in mind.

In order to gain insight into these trends, ESG surveyed 379 IT and cybersecurity professionals at organizations in North America (US and Canada) personally responsible for evaluating or purchasing identity and access management and cloud security technology products and services. This research aimed to understand the problem space, organizational responsibilities, compliance implications, and plans for securing user access to a wide portfolio of cloud services. The study also looked at the current and planned use of various authentication methods, privileged access management, device profiling, unified directories, user activity analytics, and service account protection.

Topics: Cybersecurity