Professional Documents
Culture Documents
Tech radar
Tracking innovations for efficient,
agile and smart security
Foreword
Our Atos security experts are tracking over 100 cybersecurity • Two to five years: Proven technologies are usually adopted in the
technological trends that are shaping and transforming the next two to five years cycle as organizations improve in maturity.
industry as we speak. We built our radar around eight major • 5 years and above: emerging trends will be adopted by the
cybersecurity domains, because we believe those are the mainstream after approximatively five years or more. Still,
most critical for the end to end management of your security Organizations with maturity cybersecurity level can adopt
Zeina Zakhour posture and security of your digital transformation. such emerging trends earlier.
Global Chief Technical Officer,
Digital security, Atos • Advanced Detection & Response For each technology trend captured in our radar, we have
• CERT & GRC services worked on :
• Identity & Access Management • The main business use cases it addresses.
The world is moving at the speed of digital and with new • Endpoint and Mobile Security • The benefits it brings with a focus, when applicable, on the
digital technologies, comes new security challenges that • Network Security specific market verticals.
must be addressed to secure the digital transformation by • Application Security • The main challenges to adoption that organizations must
design. In fact, this speed of innovation is expanding the • Cloud Security take into consideration when deploying any of those
‘attack surface’ and creating opportunities for threat actors • Data security cybersecurity technology trends.
to reach what is one of organizations’ most valuable assets:
their data. In addition, cybercriminals and state-sponsored Let us take a few figures Cybersecurity innovation is a key contributor to the success
actors are innovating at a fast rate, leveraging new of the digital revolution as we know it today. And undoubtful,
70% 75%
technologies to steal data, commit fraud and extort money.
70% 75%
ofoforganizations
organizations of credential
it will continue to be a key foundation for safe and secure
For instance, they already adopted Artificial Intelligence with
withpublic
publiccloud
cloud abuse attacks adoption of future technology trends such as quantum, edge
to launch stealth attacks and deepfake voice phishing capabilities
capabilities against financial & swarm computing, Ethical AI, immersive experience.
experienced a security
experienced
incidenta services directlyservices
targeteddirectly
APIs or
attacks, they are targeting new IoT and edge computing security
last year.incident
(the State
last
ofyear.
Cloud(the targeted
also. (Information
APIs or also.
Age). We hope the Atos Cyber Tech Radar will help you navigate
infrastructure as well as focusing on paralyzing critical State of Cloud
Security, 2020).Security, 2020). (Information Age). the breadth of cybersecurity technologies and support you
national infrastructures.
53% 94%
in refining the cybersecurity strategy of your organization. To
53% 94%
of web-targeted of organizations
ofattacks
web-targeted
in of organizations
have had an get informed about the full release of the tech radar, follow:
attacks
the firstinhalf have had an
identity-related
We created the Atos Cyber Tech Radar, to help organizations the https://www.linkedin.com/showcase/atos-digital-security/
of first
2020half
used identity-related
breach, which 99%
identify the security technologies that can help them address of 2020 used (Forbes).
APIrequests. APIrequests. breach,could
believe which 99%been
have believe could
prevented.
(Forbes). have been
(Identity prevented.(Identity
Defined Security Alliance). Contributors
cyber threats efficiently.
Defined Security Alliance).
Adrian Buta, Adrian Ionut Buse, Alexandru Rusandu, Allen Moffett,
With the Atos Cyber Tech Radar, organizations can keep Anca Isac, Cosmin-Alexandru Radu, Cristian Radu, Dan Schaupner,
abreast of the emerging cybersecurity innovations, and adopt For each cybersecurity domain, we have grouped the cybersecurity Dave Bixler, David Bernard, David Smyth, Diego de Felice, Farah Rigal,
an agile cybersecurity strategy that can adapt to the changing technological trends in terms of speed of adoption : Geert Fieremans, Jambulingam, Venkatesh, Jesus Lacal, Konstantinos
digital environments. • Zero to two years: Mature technologies are either already Brokalakis, Laurence B gou, Lyonel Vincent, Marc Llanes Badia, Parag
adopted by most organizations or will be in the next two Ghosalkar, Philippe Bodden, Sebastien Blanc, Theo Demoulin, Vasco
years In other words, these technologies have become an Gomes, Venkatesh Jambulingam, Vieri Tenuta, Vinod Vasudevan, Zeina
integral part of the security strategies of most companies. Zakhour and Zisis Tsiatsikas.
tech radar
encryption
Anonymization AI-driven threat modeling
Consent
tools Management
Continuous Privacy
Quantum Compliance Posture Cognitive detection & response
Key Distribution Management
Ethical
Data
Testing tools
Safe intelligence sharing
VR/AR Security
Awareness Training
Machines
Encryption Mapping AI-driven SOAR API security
Lightweight
monitoring AI-powered
Dynamic encryption Security
Personification Cyber Range
Data Masking Data Cyber deception
tools Data Discovery Dynamic
Annotation
& classification Risk-based Security
Blockchain/DL KMaaS Automated
5G monitoring
for Data Security CASB Integrated Threat modeling
& response
IT/IoT/IoMT Augmented Reality
Database Threat Modeling
Datacentric Audit Fraud MxDR
Encryption Data
& Protection Detection Security Rating
Continuous Encryption MITRE based risk management
Services
Privacy e-GRC tools Targeted Security
Data
Compliance Risk-based vulnerability Awareness
Loss
API Threat Digital management Cyber deception
Prevention
Protection signature Hybrid & multi-cloud Threat
Cloud security Enterprise Digital unified detection & Hunting Autonomous &
Immutable Threat Intelligence
Posture Management Time Rights Management response Integrated
Infrastructure Augmentation
stamping Threat hunting
Cloud Application Edge Cyber Threat MITRE
Security Testing Privacy by design security Intelligence ATT&CK
CASB Threat & vulnerability
analytics Mapping
Cloud Security Container Management
Digital
deception Security PKI
Zero Trust IaaS Container Vulnerability Surveillance
Automation Distributed
Network Access Encryption Assessment
Cloud Dynamic provisioning ledger for IAM &
Encryption CSP Native Zero-Password self-sovereign
Security Saas IAM Authentication
ID analytics identity
Security for Cloud Workload
Cloud Application Data access governance IAMaaS (Full
Serverless Cloud Protection Platform
Discovery Trusted third party access CIAM Service Idaas)
UMA (User-
DevSecOps WAF Zero Trust
Unified identity Security Managed Access)
Application Security Network Access
OpenID Connect Testing Enterprise Digital
Chaos
Rights Management Adaptive ID & Access
engineering Application Protected NgFW Malware 0
to governance
DevSecOps Gateway Browser Protection 2y Adaptative
ea Access Prescriptive IAM
Software Secure Mail rs control
Datacentric Data
Low Code/ composite Gateway IDoT (IAM for IoT)
Audit & protection Static BYOD Loss
no Code AST Analysis Prevention Continuous
security Network authentication
Access & authorization
Microsegmentation Control API Access control
API Security CASB Enterprise Digital
Monitoring & Rights 2
Secure Web WAF to
discovery Management
In-app Gateway 5 Generative identity
ye
Crowdsource Dynamic protection ar
DDoS EDR Zero Trust s
security testing AST
Mitigation Network Access
platforms
Network Security
Runtime Policy Management DNS
API Threat NextGen 5+
Application Security API Threat
protection Business Email Mobile Threat Anti-Virus ye
Self-Protection protection
Compromise Defense ar
s
Mitigation Zero Trust
Interactive Active Directory Network Access
Application Security Browser
Security Testing TLS decryption Isolation IoT devices
Microsegmentation Platform Application Security
Shielding
Contextual security Secure Instant
Communication HPC Security
5G security
by design
Network Traffic
Analyzer DLP
for Mobile Hardware
Network flow based Security
Analyzer Unified
Endpoint
Cyber Physical Management
System
Key figures
Key figures
Key figures
Key figures
Key figures
Key figures
Challenges to Adoption
• Configuring a WAF to efficiently detect
and block threats can be challenging,
since the “legitimate “ traffic depends
on applications to be protected (and
thus on application lifecycles).
Why it matters
• As Cloud adoption and Multi-Cloud deployments spread Losing track of cloud The growth of Awareness is raising Customers need to
exponentially, organizations are faced with unmanaged service & cloud shadow Cloud classify and determine
security risks and data exposure. native application leading to monitoring & the accountability for
• Organizations will need solutions for a single pane of glass a security vulnerability closer management of their data as
security operation in their Cloud and hybrid environment. Organizations may have which may lead to data cloud applications and
• Compliance with data privacy regulations and other legal lost track of the Cloud leakage or data growing attention to Ultimately the customer
rules will also require better Cloud security testing and services and Cloud breaches. The result ? cloud legal compliance, remains responsible for
continuous compliance monitoring/control. native applications used loss of trust of due to more frequent their data.
by employees inside the customers, legal occurrence of data
organization, some of complications, and even breaches and the legal
which may not conform loss of quality in the consequences thereof.
to the organization’s product offering through
security requirements. an employee run-off.
Key figures
They proactively and reactively discover and assess risk/trust of cloud services configuration
(such as network and storage configuration), and security settings (such as account privileges
and encryption). Ideally, if a setting is non compliant or a configuration represents excessive
risk, the CSPM offering can take automated action to adapt, including remediation.
CT-220203-AR-BR-Cybersecurity-Tech-Radar-en v2