You are on page 1of 1

2023 Technology Adoption

Roadmap for Security and


Risk Management

Implementation of 49 security-related technologies during 2022-2024


in large, global enterprises are mapped according to adoption phase,
deployment risk and enterprise value. Security and risk management
leaders can use this infographic to benchmark their plans and measure
against key trends.

In Planning

CASBs

Application Piloting Cloud WAAP


Shielding
UEM
Endpoint
Detection and
Response
Mobile
API Security Threat
Testing Tools Defense Breach
ITDR
Consent and and Attack
Preference Simulation SSE
Management Application Security 2023
Orchestration and Deployment Network

y
Access

urit
Correlation MDR
Digital Risk Hardware- Control Services
Appl

Protection based Security

ture and Perimeter Sec


Services
ication and Data Securit

Vulnerability Secure Web NDR


Cloud Data Prioritization Gateways
Protection Gateways Technology
Synthetic
Data Bot Management
Already Network Firewalls Remote
Enterprise Mobile Application Deployed NSPM
Browser
App Stores Security Testing Cloud Security Isolation
Privacy Management Tools Posture Management

Enterprise Key Web Application SIEM OT Security


Management Firewall CyberSecurity Mesh
struc

Web App Device Endpt Security Architecture


Client-side Secure Instant for Frontline Workers SASE
Protection Communications
y

Endpoint
Infr

Protection
Multicloud Platforms Device-native
KMass SCA Tools Biometrics
Application Security
Cloud Workload
Requirements and
Protection
Threat Modeling
Platforms Serverless
Function Security

ZTNA Identity
TLS Decryption
Graph
Platform
Passive
Behavioral
Biometrics

Enterprise Value Deployment Risk Adoption Phase


The value factor awarded to each technology The risk factor awarded to each technology The adoption phase is determined by the
is based on the analysis of value drivers, is based on the analysis of potential risks current deployment plans for a majority of
including improved speed and agility, enhanced posed, including cybersecurity risk, talent organizations. Technologies placed on the
developer experience or productivity, increased unavailability, high or unpredictable costs, border between phases are on the cusp of
cost efficiency or savings, delivery of superior and technical incompatibility or moving into the next deployment phase.
capabilities to business and/or customers, architectural complexity.
and enabling resilience and reliability.

Low Medium High Low Medium High

Key Take-Aways
Security and Risk Management

SRM leaders believe they are unlikely to see budget cuts, with over 80%
anticipating an increase in their cybersecurity budgets in 2023.
Security and Risk Management (SRM) leaders are deploying application and data
security solutions in the near term, with a longer horizon for infrastructure and
perimeter security.
SRM leaders mainly expect to derive speed and agility benefits from adopting
technologies.
SRM leaders perceive the deployment of application and data security
technologies to be relatively lower risk compared to infrastructure and perimeter
security technologies.
Organizations are deploying technologies aimed at reducing unforeseen cloud or
web application attacks in the wake of rapid digital transformation.
SRM leaders realize the necessity of making the cloud more secure as their
organizations continue to transition to a multi-cloud strategy.
With an expanding ecosystem and growing number of third-party providers, SRM
leaders are consciously valuing the importance of protecting the endpoints.
Increasing cloud adoption, flexibility of work and remote access has made it
critical for SRM leaders to lean on cost-benefit analysis, and push the case for
infrastructure security.
“Vendor supply chain disruption” was cited as a critical risk factor affecting the
adoption of SSE and ZTNA by the respondents.
SRM leaders are strongly driving the deployment of security solutions that protect
production or mission critical infrastructure.

Actionable, objective insight


Explore these additional complimentary resources and tools for I&O and IT Leaders:

eBook Infographic
Leadership Vision for Security Gartner CISO Effectiveness
and Risk Management Leaders Diagnostic
Effectively diagnose priorities and actions Improve your leadership effectiveness by comparing
to solidify your strategic plans for 2023. your behaviors and activities with your peers’.

Download eBook View Infographic

Roadmap Tool
Roadmap for Maturing Your IT Score for Security and Risk
Information Security Program Management
Build a mature information security program Learn how to benchmark key functional
to mitigate cybersecurity risk effectively. processes and activities.

Download Roadmap Get Started

Already a client?
Get access to even more resources in your client portal. Log In

Gartner for Cybersecurity Leaders Follow Us on LinkedIn Become a Client

Source: Gartner
© 2023 Gartner, Inc. and/or its affiliates. All rights reserved. CM_GTS_2171150

You might also like