Report cover image

Insights for CISOs: 2021 Annual Compendium

Publisher Frost & Sullivan
Published Jan 21, 2022
Length 97 Pages
SKU # MC16941736

Description

Insights for CISOs: 2021 Annual Compendium

2020 was a turning point for virtually every industry and human activity – cybersecurity was no exception. The migration to the cloud, the acceleration of digital transformation in many companies, the growing number of vulnerabilities, and the evolution of attacks have confronted Chief Information Security Officers (CISOs) with significant challenges they are still adjusting to in 2021.

Frost & Sullivan's security research team has created this Annual Compendium to help CISOs in every industry understand key issues around different technologies. Takeaways from this Compendium will help organizations determine which solutions most closely meet their business needs.

Why is this Compendium Valuable for CISOs?
- It provides practical advice on the solutions that can be deployed to enhance security and select vendors.
- It highlights the key developments and solutions in cybersecurity across a number of solution areas.
- It provides an understanding of the threat landscape and the vulnerabilities that organizations are exposed to.
- It highlights the main cybersecurity trends for 2022.

Table of Contents

97 Pages
    • Why is it Increasingly Difficult to Grow?
    • The Strategic Imperative 8TM
    • Growth Opportunities Fuel the Growth Pipeline Engine TM
    • Cybersecurity Market Ecosystem*
    • Cybersecurity Solutions Included in the Compendium
    • Network Firewall-Definition
    • The Impact of the Top Three Strategic Imperatives on the Global Network Firewall Industry
    • Network Firewall¯Key Trends
    • Network Firewall-Insights and Recommendations
    • Network Firewall-Key Competitors
    • Network Firewall-Trends to Watch in 2022
    • DDoS Mitigation-Definition and Types of Attacks
    • The Impact of the Top Three Strategic Imperatives on the Global DDoS Mitigation Industry
    • DDoS Mitigation-Key Trends
    • DDoS Mitigation-Insights and Recommendations
    • DDoS Mitigation¯Key Vendor Selection Criteria
    • DDoS Mitigation¯Key Competitors#
    • DDoS Mitigation-Trends to Watch in 2022
    • Secure Web Gateway-Definition
    • The Impact of the Top Three Strategic Imperatives on Secure Web Gateway Industry
    • Secure Web Gateway-Key Trends
    • Secure Web Gateway-Key Competitors
    • Secure Web Gateway-CISOs' Concerns
    • Secure Web Gateway-Insights and Recommendations
    • Secure Web Gateway-Trends to Watch in 2022
    • Workforce Identity and Access Management-Definition and Key Benefits
    • The Impact of the Top Three Strategic Imperatives on the Workforce Identity and Access Management Industry
    • Workforce Indentity and Access Management¯Key Trends
    • Workforce Identity and Access Management-Insights and Recommendations
    • Workforce Identity and Access Management-Key Industry Participants*
    • Workforce Identity Access Management-Trends to Watch in 2022
    • Email Security-Definition and Relevance
    • The Impact of the Top Three Strategic Imperatives on Email Security Industry
    • Email Security-Key Trends
    • Email Security-CISOs' Concerns
    • Email Security-Insights and Recommendations
    • Email Security-Key Market Participants
    • Email Security-Trends to Watch in 2022
    • Vulnerability Management-Definition
    • The Impact of the Top Three Strategic Imperatives on the Vulnerability Management Industry
    • Vulnerability Management¯Key Trends
    • Vulnerability Management-Insights and Recommendations
    • Vulnerability Management-Key Market Participants
    • Buying Guide-Asset Coverage/Visibility
    • Buying Guide-Vulnerability Scoring and Prioritization Methodology
    • Buying Guide-Compliance Support
    • Buying Guide-Deployment Model
    • Vulnerability Management-Trends to Watch in 2022
    • Cyber Threat Intelligence-Definition and Use Cases
    • The Impact of the Top Three Strategic Imperatives on the Cyber Threat Intelligence Industry
    • Cyber Threat Intelligence¯Key Trends
    • Cyber Threat Intelligence-Insights and Recommendations
    • Cyber Threat Intelligence-Key Market Participants
    • Cyber Threat Intelligence-Differentiation of Leading Vendors
    • Cyber Threat Intelligence-Trends to Watch in 2022
    • Extended Detection and Response-Definition and Key Promises
    • The Impact of the Top Three Strategic Imperatives on the Extended Detection and Response Industry
    • Extended Detection and Response-Key Trends
    • Extended Detection and Response-Insights and Recommendations
    • Extended Detection and Response-Key Competitors
    • Extended Detection & Response-Trends to Watch in 2022
    • Managed & Professional Security Services-Definition
    • The Impact of the Top Three Strategic Imperatives on Managed and Professional Security Services Industry
    • Managed & Professional Security Services-Key Trends
    • Managed & Professional Security Services-Insights and Recommendations
    • Managed & Professional Security Services-Key Competitors
    • MSS/PSS-Trends to Watch in 2022
    • Acronyms and Terms Defined
How Do Licenses Work?
Head shot

Questions or Comments?

Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.