![]() Continuous & exposure based technology services like External attack surface management (EASM), autonomous security testing, and threat intelligence provide an inward-looking viewpoint toward an organization’s infrastructure from the outside. ![]() The key trend across all technologies in the security operations space is greater API interactivity and availability. Hype Cycle for security operations report focuses heavily on consolidation of security operation technologies and continuous assessment & exposure-based approach technologies. The report includes a priority matrix, which presents a timetable for adoption for the security operations solutions and gives readers an idea of where organizations are prioritizing their current IT security budgets and how long it will take for these technologies to go mainstream. Gartner details the maturity, business impact, market penetration, drivers and obstacles of 21 different technologies and services that mitigate threats and reduce risk.
0 Comments
Leave a Reply. |