The The Transform Technology Summits begin October 13 with Low-Code / No Code: Enabling Enterprise Agility. Register now!
The rise of remote working has led to an increase in inventories of corporate devices in ways that no one had anticipated. This coincided with a drastic increase in endpoint cybersecurity threats. This is the compelling backdrop for Gartner’s latest Hype Cycle for Endpoint Security.
The report clearly shows that the emerging Unified Endpoint Security (UES) technology provides an important consolidation platform to manage the various parts of a cybersecurity technology stack. Information security managers need to protect unmanaged endpoints new to their networks and need the flexibility to manage them on a single platform.
Gartner’s Hype Cycle for Endpoint Security 2021 explores how IT security managers can achieve their goals while reducing costs and improving visibility and control. This year’s Hype Cycle prioritizes UES as the solution information security managers need to secure their endpoints. Based on conversations VentureBeat has had with information security executives and CIOs, the unified endpoint security market momentum is accelerating as cybersecurity teams rush to fill gaps in their business. endpoint infrastructure and prevent potential breaches before they occur.
According to Gartner, the global security software market grew 10.3% in 2020, reaching $ 49.7 billion in annual revenue. The five segments with the highest growth rates are Application Security Testing, Access Management, Endpoint Protection Platform (Enterprise), Secure Email Gateways, and Identity Governance and Administration . The Endpoint Protection Platforms (Enterprise) category is the second fastest growing global security market segment, with $ 8.8 billion in 2020 (and 20% CAGR). The top five vendors are Microsoft, McAfee, Norton LifeLock, IBM, and Broadcom.
Practical advice from the Hype Cycle
This Hype Cycle’s most practical advice comes from his suggestions for orchestrating new technologies to provide information security managers, CIOs, and cybersecurity teams with threat assessment and asset management data. in real time within a single data lake.
A single data lake approach to unified endpoint security helps control endpoint security on a complete platform that reduces risk and costs while improving asset management. According to information security officers and VentureBeat CIOs interviewed for this article, self-healing endpoints will form a baseline requirement for all budgeted cybersecurity purchases in 2022.
Here’s what’s new in Gartner’s Hype Cycle for Endpoint Security 2021. A total of 18 technologies appear in the report this year, up from 20 last year. Technologies retired from the Hype Cycle this year include browser isolation, mobile virtual infrastructure (VMI), and secure enterprise data communications, while VDI / DaaS endpoint security has been added. Clearly, secure Virtual Desktop Infrastructure (VDI) and Desktop as a Service (DaaS) connections have become a priority over the past couple of years, given the rapid growth of virtual meetings, distance learning and business calls. VDI / DaaS helps prevent hacking of virtual sessions while securing the identity of each virtual participant without bandwidth degradation.
Here are the main lessons from Gartner’s Hype Cycle for Endpoint Security, 2021:
- Gartner sees an increase in zero trust network access (ZTNA) initiatives among its corporate customers today. The Hype Cycle’s conclusion on zero trust is consistent with what information security officials tell VentureBeat about their zero trust roadmaps, pilots and plans. In nearly every conversation VentureBeat has with information security executives in financial services and manufacturing, zero trust is mentioned first as a business decision. The objective is to develop terminal security on new digital revenue models. Even before President Joe Biden’s executive order on improving the nation’s cybersecurity, 160 cybersecurity vendors claimed to have no trust-based cloud products or services. Interest in zero trust continues to overtake the broader cybersecurity market, growing over 230% in 2020 from 2019, according to Gartner.
- ZTNA’s product scale has expanded beyond web applications to support a wider range of applications and protocols, illustrating an accelerated pace of innovation. Gartner notes that the current generation of ZTNA applications have improved user experience, increased flexibility, and better adaptability based on personality and roles. Gartner also notes that “ZTNA’s cloud-based offerings improve scalability and ease of adoption.” Absolute Software’s acquisition of NetMotion is premonitory in positioning the combined companies to deliver what CISOs are looking for in a ZTNA solution. Other companies in the ZTNA space to watch out for include Ericom – which includes ZTNA and other technologies in the cycle, such as remote browser isolation, secure web gateway, and CASB – in its ZTEdge platform. Zero Trust Cloud Security. Ivanti Neuros for Zero Trust Access uses machine learning to streamline security policies, compliance, and least privileged access between users, devices, and applications to ensure network micro-segmentation is in effect. Other ZTNA providers to watch out for are Akamai, Appgate, Cato Networks, Netskope, Perimeter 81, Proofpoint, and SAIFE.
- Unified Endpoint Management (UEM) is gaining respect during the pandemic and seeing its uptake increase. UEM has proven its value during the pandemic by unifying identity, security and remote access in support of ZTNA architectures now considered essential to secure a workforce anywhere. Like ZTNA, UEM has experienced rapid innovation over the past 12-18 months, with the goal of reducing security and compliance risks, as well as supporting more devices. and operating systems. The benefits of UEM include streamlining continuous operating system updates across multiple devices and mobile platforms, device management, and an architecture capable of supporting a wide range of devices and systems. ‘exploitation, explain why companies are seeking to expand their adoption of EMU. Another major benefit mentioned by companies is the automation of patch, policy, and configuration management over the Internet. UEM leaders include Ivanti, which provides its customers with additional security solutions built into its UEM platform, including passwordless multi-factor authentication (its Zero Sign-On feature) and Mobile Threat Defense (MTD ). Additional vendors to watch out for in UEM include Blackberry, Citrix, and Sophos.
The typical enterprise technology stack strives to support the influx of new, unmanaged devices onto cybersecurity networks. It’s common to find Endpoint Detection and Response (EDR), Mobile Threat Defense (MTD), and Endpoint Protection (EPP) platforms overloaded with custom patches to support device inventories. that no one had planned to grow so quickly.
Gartner’s latest Hype Cycle for Endpoint Security advocates for unified endpoint security to be a vital platform to bring together the various parts of the cybersecurity technology stack of tomorrow. Endpoint security providers must rise to the challenge and step up their pace of innovation to slow ransomware and the worst cyber attacks that are reaching record levels this year.
VentureBeat’s mission is to be a digital public place for technical decision-makers to learn about transformative technology and conduct transactions. Our site provides essential information on data technologies and strategies to guide you in managing your organizations. We invite you to become a member of our community, to access:
- up-to-date information on the topics that interest you
- our newsletters
- Closed thought leader content and discounted access to our popular events, such as Transform 2021: Learn more
- networking features, and more
Become a member