Get the Gartner 2020 Hype Cycle for Security Operations


“Detection aligned closely with response has been an increasing theme in the security operations landscape. The detection element can include the detection of security threats, but also the detection of exposure to vulnerability, and the leaking of assets such as privileged data or credentials.”
–Gartner
Cover image

In the 2020 Hype Cycle for Security Operations, Gartner lends insight into 17 security operations technologies and services that can help security and risk management leaders enhance their overall security strategy.

What security operations technologies and processes have your organization already implemented? Which others should you consider?

Learn more about the entire spectrum of technologies and services available to organizations like yours.

Download the 2020 Hype Cycle for Security Operations now.
 

Recognized Technologies Include:

"Managed Detection and Response - Managed detection and response (MDR) providers leverage a combination of technologies deployed at the host and network layers, as well as advanced analytics, threat intelligence, and human expertise to deliver 24/7 monitoring, detection, and response to cyberthreats.

Vulnerability Prioritization Technology - Streamlines and focuses the vulnerability analysis and remediation/mitigation process to identify and prioritize vulnerabilities that pose the greatest risks to your organization.

Digital Risk Protection Services (DRPS) -  A combination of people, process, and technologies that improve decision making and business performance to map, monitor, mitigate, and manage the potential impact to critical digital assets and ensure business operations are always preserved."


Gartner, Hype Cycle for Security Operations, 2020, 23 June 2020, Pete Shoard

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.
Chat icon

For organizations seeking a security operations center, Arctic Wolf’s AWN CyberSOC™ is the perfect solution. To do the equivalent internally would have cost us far more and taken many tmonths. AWN’s Concierge Security Engineer™ acts as extension of our IT team and provides a level of service that can only be described as incredible.
Larry Chapman, IT Manager, Trusource Labs

Get Your Copy