ESG Infographic: The Maturation of Cloud-native Security

Abstract:

Cloud-native applications now serve critical front-, middle-, and back-office business operations.

Find out how factors like container use, a diverse threat model, and shifts in approaches are affecting the market with this infographic. 

Topics: Cybersecurity

ESG Master Survey Results: The Life and Times of Cybersecurity Professionals 2021

Abstract:

ESG conducted a comprehensive online survey of information security and IT professionals from private- and public-sector organizations in North America (United States and Canada), Europe, Asia, Central/South America, and Africa between March 1, 2021 and April 7, 2021. To qualify for this survey, respondents were required to be information security and IT professionals from ISSA’s member list.

This Master Survey Results presentation focuses on the lives and experiences of cybersecurity professionals, including performance assessments of their cybersecurity leaders, as well as suggestions for what organizations can do to help cybersecurity professionals succeed.

Topics: Cybersecurity

ESG Master Survey Results: The Maturation of Cloud-native Security - Securing Modern Apps and Infrastructure

Abstract:

ESG conducted a comprehensive online survey of IT security professionals from private- and public-sector organizations in North America (United States and Canada) between December 7, 2020 and December 26, 2020. To qualify for this survey, respondents were required to be IT/information security professionals responsible for evaluating or purchasing cloud security technology products and services.

This Master Survey Results presentation focuses on the current and future composition and environments of cloud-native apps and infrastructure, including the security problem space with respect to operational challenges and the threat landscape.

Topics: Cybersecurity Cloud Services & Orchestration

ESG Brief: Organizational Considerations Weigh Heavily on Zero Trust Success

Abstract:

The breadth of zero trust inherently requires a variety of teams to collaborate effectively for implementations to be successful. Given this, it is unsurprising that organizational issues are the most common reason cited for projects being paused or abandoned. Effective communications channels, clarity of roles and responsibilities, and alignment of goals and success metrics are all important aspects of a zero trust strategy.

Topics: Cybersecurity

ESG Master Survey Results: The State of Zero Trust Security Strategies

Abstract:

This Master Survey Results presentation focuses on understanding the factors influencing zero trust initiatives, how decision makers are prioritizing purchasing decisions, and which specific technologies and products are being deployed to support zero trust strategies.

ESG conducted a comprehensive online survey of IT and cybersecurity professionals from private- and public-sector organizations in North America (United States and Canada) between December 8, 2020 and December 22, 2020. To qualify for this survey, respondents were required to be cybersecurity or IT/information security professionals responsible for evaluating, purchasing, and managing security technology products and services in support of zero trust security initiatives.

Topics: Cybersecurity

ESG Research Report: The Maturation of Cloud-native Security

Abstract:

The composition of cloud-native applications is a mix of APIs, containers, VMs, and serverless functions continuously integrated and delivered. Securing these applications, the underlying infrastructure, and the automation platforms that orchestrate their deployment necessitates revisiting threat models, gaining organizational alignment, and leveraging purposeful controls. Additionally, as security and DevOps continue to converge, cloud security controls are being consolidated. Project teams are evolving from a siloed approach to a unified strategy to securing cloud-native applications and platforms. In parallel, vendors are consolidating cloud security posture management (CSPM), cloud workload protection (CWP), container security, and more into integrated cloud security suites, impacting buyer personas and vendor sales motions.

In order to gain insight into these trends, ESG surveyed 383 IT and cybersecurity professionals at organizations in North America (US and Canada) personally responsible for evaluating or purchasing cloud security technology products and services.

Topics: Cybersecurity Cloud Services & Orchestration

ESG Brief: Re-emphasizing Data Security as Part of a Zero Trust Approach

Abstract:

Zero trust remains a broad initiative with a wide array of use cases, supporting technologies, and starting points. While it may seem that focus has shifted away from data security in recent years, many organizations consider it a critical component of their zero trust strategy. To address zero trust requirements, data classification and security solutions must support deployment flexibility, risk assessment, automation, and integrations with other solutions.

Topics: Cybersecurity

ESG Infographic: The State of Zero-trust Security Strategies

Abstract:

Zero-trust approaches are arguably more relevant than ever due to the increasingly distributed nature of the modern enterprise, which has only been accelerated by the shift to work-from-home models. Yet for many organizations, confusion remains as to exactly what a zero-trust initiative should entail, where to begin, and how best to overcome the organizational obstacles that result from such a cross-functional undertaking.

Topics: Cybersecurity

ESG Research Report: The State of Zero-trust Security Strategies

Abstract:

Zero-trust approaches are arguably more relevant than ever due to the increasingly distributed nature of the modern enterprise. Whether implementing least-privilege tenets for user access or securing the connections to and between the disparate aspects of today’s hybrid multi-cloud deployments, zero trust can provide a framework to secure even the most complex environments. The sudden shift to work-from-home models has only highlighted the importance of a zero-trust approach. Yet for many organizations, confusion remains as to exactly what a zero-trust initiative should entail, where to begin, and how best to overcome the organizational obstacles that result from such a cross-functional undertaking.

In order to gain insight into these trends, ESG surveyed 421 IT and cybersecurity professionals at organizations in North America (US and Canada) personally responsible for driving zero-trust security strategies and evaluating, purchasing, and managing security technology products and services in support of these initiatives.

Topics: Cybersecurity

ESG Master Survey Results: Cybersecurity in the C-suite and Boardroom

Abstract:

ESG’s Master Survey Results provide the complete output of syndicated research surveys in graphical format. In addition to the data, these documents provide background information on the survey, including respondent profiles at an individual and organizational level. It is important to note that these documents do not contain analysis of the data.

This Master Survey Results presentation focuses on identifying the role of cybersecurity within the overall corporate mission and understanding the existing processes and communications between security managers, business executives, and corporate boards.

Topics: Cybersecurity