It’s more important than ever to accurately assess underappreciated risk and threat vectors and to identify effective and efficient ways to address them.
Our latest research shows the average number of planned investments in Cybersecurity technology tops all other tech categories we studied.
We work closely with vendors and end users alike to stay up to date on how organizations are investing, what problems they’re trying to solve, and how the market is changing or adapting to the latest trends. Enterprise Strategy Group’s Cybersecurity analysts and research cover every aspect of an organization’s cybersecurity needs and lifecycle, including:
- Application security
- Cloud security
- Cyber risk management
- Data security
- Identity & access management
- Network security
- Security operations
- Threat detection & response
- User protection
Research Report
Security Hygiene and Posture Management Remains Decentralized and Complex
Security hygiene and posture management has become increasingly difficult because of factors like a growing attack surface, the increased use of cloud computing, and the need to support a remote workforce. These factors can create security vulnerabilities that lead directly to cyber-attacks.
Analysts Covering Cybersecurity
David Vance
Senior Analyst, Risk & Vulnerability Management
Areas of Expertise
- API Security
- Application Security Posture Management
- Application Security Testing
- Attack Surface Management (ASM)
- Cloud Native Application Protection Platforms
- Container Security
Todd Thiemann
Senior Analyst, IAM & Data Security
Areas of Expertise
- Biometrics and Behavioral Analytics
- Data Protection
- Encryption & Key Management
- Identity & Access Management (IAM)
- Identity Threat Detection & Response
- Leveraging AI and ML to improve cybersecurity
John Grady
Principal Analyst, Network Security & Web Application Security
Areas of Expertise
- Bot Mitigation
- CASB
- DDoS
- Firewall
- IPS
- Microsegmentation
Dave Gruber
Principal Analyst, Ransomware, SecOps & Services
Areas of Expertise
- Attack Surface Management (ASM)
- Data Leakage Prevention
- DevSecOps
- Email Security
- Endpoint Security
- Extended Detection & Response
Gabe Knuth
Senior Analyst, End-user Computing & User Protection
Areas of Expertise
- Desktop & App Virtualization (VDI)
- Desktop-as-a-Service (DaaS)
- Digital Employee Experience (DEX)
- Digital Workspaces
- Email Security
- End-User Devices & Hardware
Melinda Marks
Practice Director, Application & Cloud Security
Areas of Expertise
- API Security
- Application Security
- Cloud Security Posture Management
- Cloud Workload Protection Platforms
- Cloud-native Technologies
- Container Security
Brian McKenna
Senior Analyst, Business Applications & EMEA Analyst Services Director
Areas of Expertise
- Business & Technology Strategy
- Business Applications
- Business Intelligence
- Contact Center
- Customer Data Platforms (CDP)
- Customer Experience/CRM
Aaron Tan
Regional Director, Analyst Services, APAC
Areas of Expertise
- Application Modernization & DevOps
- Business Applications
- Cloud Computing
- Cybersecurity
- DevOps
- IaaS/Cloud
Recent Cybersecurity Insights
Blog | March 7, 2024
From Market and Competitive Intelligence to ESG Analyst
Research Report | March 7, 2024
Trends in Zero Trust Strategies and Practices Remain Fragmented, but Many Are Seeing Success
Blog | March 7, 2024
Catalyzing Change: From Vendor Marketing to ESG Analyst
Survey Results | February 29, 2024