Insights for CISOs: 2021 Annual Compendium
Insights for CISOs: 2021 Annual Compendium Updated Research Available
An Actionable Guide to Help CISOs in their Selection of Security Solutions in the COVID-19 Era
21-Jan-2022
Global
Description
2020 was a turning point for virtually every industry and human activity – cybersecurity was no exception. The migration to the cloud, the acceleration of digital transformation in many companies, the growing number of vulnerabilities, and the evolution of attacks have confronted Chief Information Security Officers (CISOs) with significant challenges they are still adjusting to in 2021.
Frost & Sullivan's security research team has created this Annual Compendium to help CISOs in every industry understand key issues around different technologies. Takeaways from this Compendium will help organizations determine which solutions most closely meet their business needs.
Why is this Compendium Valuable for CISOs?
- It provides practical advice on the solutions that can be deployed to enhance security and select vendors.
- It highlights the key developments and solutions in cybersecurity across a number of solution areas.
- It provides an understanding of the threat landscape and the vulnerabilities that organizations are exposed to.
- It highlights the main cybersecurity trends for 2022.
Table of Contents
Why is it Increasingly Difficult to Grow?
The Strategic Imperative 8™
Growth Opportunities Fuel the Growth Pipeline Engine™
Executive Summary
Cybersecurity Market Ecosystem*
Cybersecurity Solutions Included in the Compendium
Network Firewall—Definition
The Impact of the Top Three Strategic Imperatives on the Global Network Firewall Industry
Network Firewall―Key Trends
Network Firewall—Insights and Recommendations
Network Firewall—Key Competitors
Network Firewall—Trends to Watch in 2022
DDoS Mitigation—Definition and Types of Attacks
The Impact of the Top Three Strategic Imperatives on the Global DDoS Mitigation Industry
DDoS Mitigation—Key Trends
DDoS Mitigation—Insights and Recommendations
DDoS Mitigation―Key Vendor Selection Criteria
DDoS Mitigation―Key Competitors#
DDoS Mitigation—Trends to Watch in 2022
Secure Web Gateway—Definition
The Impact of the Top Three Strategic Imperatives on Secure Web Gateway Industry
Secure Web Gateway—Key Trends
Secure Web Gateway—Key Competitors
Secure Web Gateway—CISOs' Concerns
Secure Web Gateway—Insights and Recommendations
Secure Web Gateway—Trends to Watch in 2022
Workforce Identity and Access Management—Definition and Key Benefits
The Impact of the Top Three Strategic Imperatives on the Workforce Identity and Access Management Industry
Workforce Indentity and Access Management―Key Trends
Workforce Identity and Access Management—Insights and Recommendations
Workforce Identity and Access Management—Key Industry Participants*
Workforce Identity Access Management—Trends to Watch in 2022
Email Security—Definition and Relevance
The Impact of the Top Three Strategic Imperatives on Email Security Industry
Email Security—Key Trends
Email Security—CISOs' Concerns
Email Security—Insights and Recommendations
Email Security—Key Market Participants
Email Security—Trends to Watch in 2022
Vulnerability Management—Definition
The Impact of the Top Three Strategic Imperatives on the Vulnerability Management Industry
Vulnerability Management―Key Trends
Vulnerability Management—Insights and Recommendations
Vulnerability Management—Key Market Participants
Buying Guide—Asset Coverage/Visibility
Buying Guide—Vulnerability Scoring and Prioritization Methodology
Buying Guide—Compliance Support
Buying Guide—Deployment Model
Vulnerability Management—Trends to Watch in 2022
Cyber Threat Intelligence—Definition and Use Cases
The Impact of the Top Three Strategic Imperatives on the Cyber Threat Intelligence Industry
Cyber Threat Intelligence―Key Trends
Cyber Threat Intelligence—Insights and Recommendations
Cyber Threat Intelligence—Key Market Participants
Cyber Threat Intelligence—Differentiation of Leading Vendors
Cyber Threat Intelligence—Trends to Watch in 2022
Extended Detection and Response—Definition and Key Promises
The Impact of the Top Three Strategic Imperatives on the Extended Detection and Response Industry
Extended Detection and Response—Key Trends
Extended Detection and Response—Insights and Recommendations
Extended Detection and Response—Key Competitors
Extended Detection & Response—Trends to Watch in 2022
Extended Detection & Response—Trends to Watch in 2022 (continued)
Managed & Professional Security Services—Definition
The Impact of the Top Three Strategic Imperatives on Managed and Professional Security Services Industry
Managed & Professional Security Services—Key Trends
Managed & Professional Security Services—Insights and Recommendations
Managed & Professional Security Services—Key Competitors
MSS/PSS—Trends to Watch in 2022
MSS/PSS—Trends to Watch in 2022 (continued)
Acronyms and Terms Defined
Acronyms and Terms Defined (continued)
Acronyms and Terms Defined (continued)
Acronyms and Terms Defined (continued)
Acronyms and Terms Defined (continued)
Acronyms and Terms Defined (continued)
List of Exhibits
Legal Disclaimer
Popular Topics
No Index | No |
---|---|
Podcast | No |
Author | Clara Dello Russo |
Industries | Information Technology |
WIP Number | K6F7-01-00-00-00 |
Is Prebook | No |
GPS Codes | 9659 |