Showing 13 results
-
Tech Launch Perspective
Sovereign Cloud – Review of Google Cloud’s Product Update Announcements
June 30, 2025In May 2025, Google Cloud expanded its sovereign cloud offerings to address increasing demands for data sovereignty and operational autonomy. It launched Google Cloud Air-Gapped, a fully isolated environment designed for sectors with stringent data security requirements, such as defense and intelligence. This solution operates without external network connectivity and is authorized to handle US government Top Secret data. Google Cloud Dedicated, developed in partnership with Thales, a French leader in cybersecurity, offers region-specific services operated by local partners to meet national compliance standards, such as France’s SecNumCloud. The Google Cloud Data Boundary service expansion now offers customers granular control over data residency and access, complemented by the User Data Shield, which incorporates Mandiant’s security assessments to validate application security postures. While these initiatives demonstrate Google Cloud’s commitment to offering flexible, secure, and compliant cloud solutions, challenges remain. These challenges include the limited geographic availability of certain services and complexities in integrating sovereign solutions with existing multi-cloud architectures. Enterprises must carefully assess these factors when considering Google Cloud’s offerings for their sovereignty objectives. -
Tech Launch Perspective
IBM Z17 – Review of IBM’s Next-Generation Mainframe Solution
June 30, 2025In April 2025, IBM unveiled the latest evolution of its mainframe portfolio with the introduction of IBM Z17, advancing its long-standing leadership in mainframes. IBM has long been a cornerstone in the evolution of enterprise computing, with its mainframe systems being vital in supporting mission-critical operations across industries. Known for their reliability, security, and performance, IBM has consistently adapted its mainframes to meet changing business needs. IBM Z17 focuses on delivering alignment with enterprise hybrid cloud and sustainability goals. It stands out with features such as quantum-safe encryption through Crypto Express 8S, Watsonx Assistant for Z, Operations Unite, and AI-enabled processing at the core. It introduces enhanced security features and hybrid cloud readiness, offering enterprises a flexible, future-ready solution to modernize while empowering mission-critical workloads in a rapidly transforming digital landscape. This evolution in the Z series reinforces IBM’s commitment to autonomous IT, streamlining operations, enhancing user experiences, while addressing long-standing challenges such as talent shortages and legacy system constraints. -
Provider Compendium
Managed Detection and Response (MDR) Services – Provider Compendium 2025
June 30, 2025The rise of cloud computing, IoT devices, and IT-OT convergence has significantly expanded the attack surface, making enterprises more vulnerable to advanced cyber threats. Organizations struggle with managing complex security environments, bridging talent shortages, and balancing budget constraints while ensuring robust cybersecurity. As a result, they increasingly turn to Managed Detection and Response (MDR) providers for real-time threat visibility, automated incident containment, and seamless security integration. Providers are addressing these challenges by integrating cutting-edge innovations such as generative AI-driven threat detection, incident response, and threat investigation, Security Operations Center (SOC)-as-a-service for scalable cloud-based operations, and XDR capabilities for holistic telemetry coverage. The growing convergence of IT and OT security has also fuelled the demand for unified SOCs capable of managing diverse digital ecosystems. This compendium provides detailed and fact-based snapshots of 29 global MDR providers featured on the Managed Detection and Response (MDR) Services – Provider Compendium 2025. Each profile offers a comprehensive picture of the provider’s operations, delivery presence, solutions, investments, and market success. -
Tech Launch Perspective
Cybersecurity – Review of SentinelOne’s Product Launch Announcements at RSAC 2025
June 30, 2025In this report, we assess SentinelOne’s evolving cybersecurity portfolio, emphasizing the strategic innovations showcased at the RSA Conference (RSAC) 2025. SentinelOne introduced Purple AI Athena, an agentic AI that autonomously triages, investigates, and remediates security incidents. It also enhanced Singularity Hyperautomation, a no‑code workflow engine that converts analyst actions into reusable playbooks and integrates with third‑party Security Information and Event Management (SIEMs) and data lakes for a unified security‑operations view. These enhancements aim to tackle persistent Security Operations Center (SOC) challenges by filtering alert noise, expediting investigations, and orchestrating cross‑tool responses at machine speed. SentinelOne also strengthened its multi‑cloud workload‑protection capabilities and highlighted interoperability across containerized and serverless environments. However, the expanded automation features may overlap with established Security Orchestration, Automation, and Response (SOAR) platforms, and large enterprises will scrutinize Purple AI’s explainability and guardrails before adopting autonomous response at scale. SentinelOne’s future roadmaps must clarify integration depth with legacy security stacks and outline a robust AI governance framework. -
Feb. 28, 2025Cloud computing, IoT devices, and IT-OT convergence have significantly expanded enterprises' attack surfaces, making them more vulnerable to advanced cyber threats. Organizations struggle with managing complex security environments, bridging talent shortages, and balancing budget constraints while ensuring robust cybersecurity. As a result, they increasingly turn to Managed Detection and Response (MDR) providers for real-time threat visibility, automated incident containment, and seamless security integration. Providers are addressing these challenges by integrating cutting-edge innovations such as generative AI-driven threat detection, incident response, threat investigation, security-operations-center-as-a-service for scalable cloud-based operations, and extended detection and response capabilities for holistic telemetry coverage. IT and OT security’s growing convergence has also fueled the demand for unified security operations centers capable of managing diverse digital ecosystems. In this report, we assess 29 global MDR providers featured on the Managed Detection and Response (MDR) Services PEAK Matrix® Assessment 2025. The assessment is based on Everest Group’s annual RFI process for the calendar year 2024, interactions with leading MDR providers, client reference checks, and an ongoing analysis of the MDR services market. Scope All industries and geographies Contents In this report, we examine: MDR Services PEAK Matrix® assessment characteristics and providers’ positioning Key sourcing considerations for enterprises selecting MDR providers Providers’ key strengths and limitations Membership(s) Cybersecurity Sourcing and Vendor Management
-
Viewpoint
Security for Modern Infrastructure
Aug. 30, 2024Rapidly transforming digital modernization in IT infrastructure has unified cloud, on-premise, and edge environments. This integration amplifies complexity and broadens the attack surface, heightening the infrastructure's susceptibility to cyber threats. Modern infrastructure demands a contemporary approach for enhanced preparedness against evolving threats. Enterprises must integrate next-gen technologies to achieve holistic cybersecurity, emphasizing economy, efficiency, and effectiveness. Recognizing cybersecurity as a business growth enabler rather than just a cost is essential for enterprises. This viewpoint highlights the need for an evolved cybersecurity approach tailored to this modern infrastructure. This report is based on Everest Group’s comprehensive research, industry expertise, interactions with leading providers and enterprises, and ongoing market analysis. Scope All industries and geographies Contents In this report, we examine: Modern infrastructure security Evolving cyber threats in modern infrastructure Security adoption guide for enterprises Next-gen cybersecurity solutions Enterprise considerations for Proactive, Panaroma, Resist, and Regain (P2R2) framework adoption Membership(s) Cybersecurity Sourcing and Vendor Management -
Tech Launch Perspective
Microsoft Security – Review of Microsoft Security’s Product Launch at RSAC ’24
July 03, 2024Microsoft's cybersecurity landscape in 2024 reveals its strategic investments in innovation, particularly in integrating Defender, Sentinel, and Co-pilot, and challenges in maturing existing capabilities. While these integrated solutions show promise, recent security breaches and identified vulnerabilities in Defender for Office 365 raise concerns about Microsoft's overall security offerings. In this report, we highlight the need for Microsoft to rebuild trust with federal agencies and enterprise customers by further developing Sentinel’s investigation and forensic capabilities to address evolving threats and customer requirements. The report offers detailed customer feedback, additional pain points and unmet needs, and a thorough competitive landscape review of Microsoft’s position in the cybersecurity market. It also provides actionable recommendations for Microsoft to enhance its security posture, mitigate vulnerabilities, and ensure a more secure future for its customers in an increasingly complex threat environment. Scope All industries and geographies Contents In this report, we examine: Microsoft’s cybersecurity strategy, its investments in innovation, integrated solutions (Defender, Sentinel, and Co-pilot), and key challenges Key findings and recommendations, Microsoft’s strengths and weaknesses, and improvement areas in the cybersecurity landscape Impact of security incidents on customer trust, vulnerabilities in Defender for Office 365, and the need for enhanced forensic capabilities in Sentinel Membership(s) Cybersecurity Sourcing and Vendor Management -
Tech Launch Perspective
Security – Review of Google Next ’24 Product Launch
May 06, 2024During its Google Cloud Next ’24 event, in Las Vegas on April 9-11, 2024, Google Cloud emphasized its dedication to AI security by introducing Gemini, a large language model designed to revolutionize threat detection and response. This innovation uses AI and zero-trust principles to automate tasks and strengthen security posture. Additionally, Google Cloud announced advances in simplifying endpoint security, streamlining processes, and improving threat mitigation. Another key theme was the focus on intelligence-driven security operations. By leveraging AI and analytics, Google Cloud aims to provide proactive threat intelligence and real-time threat detection, enabling faster and more agile incident response. In this report, we provide our cutting-edge insights into the new product release and explore its potential to address key challenges and objectives, empowering informed early-stage product decisions. Scope All industries and geographies The report is based on our assessment of information released by Google Cloud during its Google Cloud Next ’24 event Contents In this report, we: Outline key security issues and objectives, as well as themes that are driving and inhibiting demand Detail Google’s current positioning with respect to its security products portfolio Analyze the product’s strengths and areas of improvement Membership(s) Cybersecurity Sourcing and Vendor Management -
Provider Compendium
Cloud Security Services – Provider Compendium 2024
Jan. 24, 2024The demand for cloud security services in the global business landscape is accelerating due to enterprises’ digital transformation mandates, rising importance of data protection, and challenges in securing hybrid multicloud environments. The expansion of cloud infrastructure has resulted in larger attack surfaces, a rise in cyber threats, complexities in posture management, and frequent changes in regional cloud governance and security policies, intensifying the need for effective cloud security solutions. In response to stricter data protection regulations, enterprises face growing pressure to comply with data privacy laws and address increasing cybersecurity threats. The post-pandemic landscape, characterized by remote work and security vulnerabilities, has intensified cyber risks. To mitigate these risks, enterprises are prioritizing cloud security services to offer comprehensive end-to-end protection across complex hybrid multicloud systems. Cloud security providers are enhancing their capabilities to meet these demands, emphasizing a platform-driven approach with next-generation features such as DevSecOps, automation, and zero trust. Collaborative efforts with cloud-native and third-party security providers are vital to deliver sophisticated, adaptable, and globally compliant cloud security services. This compendium provides detailed and fact-based snapshots of 18 global cloud security providers featured on the Cloud Security Services PEAK Matrix® Assessment 2023. Each profile offers a comprehensive picture of the provider’s operational overview, delivery presence, solutions on offer, investments, and market success. Scope All industries and geographies Services: cloud security The assessment is based on Everest Group’s annual RFI process for the calendar year 2023, interactions with leading cloud security providers, client reference checks, and an ongoing analysis of the cloud security services market Contents In this report, we: Examine 18 cloud security provider profiles Evaluate enterprise sourcing considerations Study providers’ key strengths and limitations Membership(s) Cybersecurity Cloud and Infrastructure Services -
State of the Market
From Risk Mitigation to ESG Leadership: The Untapped Potential of Managed Detection and Response (MDR)
Jan. 17, 2024The Managed Detection and Response (MDR) services report thoroughly examines the MDR services market, providing valuable insights into its size, growth rate, and demand drivers. The report assesses the demand for MDR services across major geographical regions and industry verticals. It looks at how MDR services can be leveraged to address specific Environmental, Social, and Governance (ESG) objectives, encompassing various facets such as heightened operational efficiency for reducing carbon emissions, minimizing e-waste, monitoring compliance, fortifying cybersecurity measures, and safeguarding brand reputation through advanced threat intelligence. In addition to discussing these aspects, the report provides a comprehensive overview of key considerations for enterprises adopting MDR services on their sustainability journeys. This includes a detailed roadmap and steps for aligning MDR with sustainability goals, critical factors to consider when selecting an MDR services provider, the definition of materiality assessment accompanied by relevant Key Performance Indicators (KPIs), and a compilation of best practices to ensure that MDR effectively contributes to meeting ESG mandates. The report outlines actionable initiatives for MDR service providers seeking to establish sustainability as an integral aspect of their service offerings. The report also features five MDR technology provider profiles, highlighting their overall MDR portfolio and capabilities. Scope All industries and geographies Contents In this report, we examine: Global MDR services market overview including market size, growth, and drivers across major geographies and industry verticals The alignment of MDR services to drive sustainability Key enterprise consideration for MDR services Cybersecurity Sustainability Technology and Services Outsourcing Excellence