Showing 55 results
-
Tech Launch Perspective
Cybersecurity – Review of SentinelOne’s Product Launch Announcements at RSAC 2025
June 30, 2025In this report, we assess SentinelOne’s evolving cybersecurity portfolio, emphasizing the strategic innovations showcased at the RSA Conference (RSAC) 2025. SentinelOne introduced Purple AI Athena, an agentic AI that autonomously triages, investigates, and remediates security incidents. It also enhanced Singularity Hyperautomation, a no‑code workflow engine that converts analyst actions into reusable playbooks and integrates with third‑party Security Information and Event Management (SIEMs) and data lakes for a unified security‑operations view. These enhancements aim to tackle persistent Security Operations Center (SOC) challenges by filtering alert noise, expediting investigations, and orchestrating cross‑tool responses at machine speed. SentinelOne also strengthened its multi‑cloud workload‑protection capabilities and highlighted interoperability across containerized and serverless environments. However, the expanded automation features may overlap with established Security Orchestration, Automation, and Response (SOAR) platforms, and large enterprises will scrutinize Purple AI’s explainability and guardrails before adopting autonomous response at scale. SentinelOne’s future roadmaps must clarify integration depth with legacy security stacks and outline a robust AI governance framework. -
FEATUREDViewpoint
Generative AI in Action: Transforming Security Operations Centers (SOCs) for Modern Cyber Defense
June 27, 2025Gen AI is transforming how SOCs detect, respond to, and manage cyber threats. It enables automating repetitive tasks such as log analysis, alert triage, and incident investigation – freeing analysts to focus on strategic threat hunting and decision-making. Integrated effectively, gen AI enhances operational efficiency, reduces mean time to respond, and supports real-time risk profiling. This Viewpoint explores how gen AI fits across SOC architecture layers – from data collection and processing to analytics and incident response. It highlights real-world use cases, including AI-generated threat summaries, vulnerability detection through SAST/SCA automation, and intelligent response orchestration. Gen AI is also essential in workforce development, helping junior analysts upskill through guided workflows and natural language-based interfaces. While the benefits are compelling, organizations must navigate risks such as rising implementation costs, expanded attack surfaces, governance complexities, and the potential erosion of analyst skill development. Planning, budgeting, and responsibly integrating gen AI are key to realizing its full value. A structured SMART-G framework defined in this Viewpoint can guide enterprises through strategic alignment, infrastructure readiness, model optimization, workforce training, and governance. The result is a future-ready SOC – resilient, scalable, and built for a rapidly evolving threat landscape. -
June 27, 2025As enterprise IT ecosystems grow more complex with hybrid environments, expanding threat surfaces, and an urgent need for faster threat response, organizations are partnering with specialist Managed Detection and Response (MDR) providers for highly tuned and expert-led cybersecurity services. These specialists are becoming vital partners in enabling 24×7 monitoring, rapid containment, and advanced threat detection across endpoints, cloud, and operational technology. Specialist MDR providers offer identity-aware threat detection, curated threat intelligence, and fully integrated remediation support, often tailored to lean security teams. The emphasis is on deployment agility, customized detection pipelines, and seamless scalability, coupled with investments in automation, unified telemetry, and co-innovation partnerships. In this report, Everest Group analyzes eight MDR providers featured on the Managed Detection and Response (MDR) Services Specialists PEAK Matrix® Assessment 2025. The report is designed to offer enterprises an informed lens to evaluate MDR specialist partners and equip providers with a benchmarking tool to examine their relative market positioning and investment priorities.
-
June 26, 2025With rapid digitization expanding the attack surface, the rise in sophisticated and state-sponsored cyber threats, and intensifying regulatory scrutiny on breach monitoring and reporting, demand for comprehensive Cyber Threat Detection and Response (CTDR) solutions continues to grow. In response to this demand, a broad range of technology providers now offer CTDR platforms tailored to diverse enterprise needs. Additionally, managed service providers deliver threat detection and response services through third-party platforms, proprietary solutions, or a hybrid of both. Regardless of the delivery model, whether in-house, managed, or hybrid, CTDR platforms serve as the foundation for threat visibility, investigation, and response. In this report, we provide an in-depth evaluation of enterprises’ CTDR postures, challenges, and investment priorities, based on a survey of enterprise customers using leading CTDR platforms. We also highlight evolving expectations and adoption dynamics in the CTDR space. Additionally, this report evaluates customer satisfaction across eight distinct parameters for 12 leading CTDR platform providers and provides an overview of their solution portfolios, helping enterprises navigate the evolving threat landscape and make informed decisions.
-
State of the Market
Cybersecurity Services State of the Market 2025
May 30, 2025The cybersecurity services market is rapidly evolving as enterprises grapple with an expanding digital threat landscape intensified by AI transformation. With increasing deployment of generative and agentic AI systems, security challenges are no longer limited to infrastructure – they now include data provenance, hallucinations, model manipulation, and autonomous decision-making governance. The global market size is estimated at US$94-97 billion in 2024, with expected double-digit growth led by increased demand for secure AI infrastructure, real-time threat intelligence, and zero-trust execution models. North America and Europe are leading adoption due to regulatory mandates such as DORA and NIS2, while industries such as BFSI, healthcare, and manufacturing are investing in segment-specific cybersecurity solutions. This report explores cybersecurity adoption patterns across industries, the strategic shift toward outcome-based service models, and the key role of secure-by-design principles in AI-enabled enterprises. It also introduces a risk mapping framework for AI transformation, highlighting the multilayered complexities of securing application, infrastructure, and model layers in generative and agentic AI systems. The report equips cybersecurity leaders with a structured playbook for secure AI adoption, spanning the stages of prioritization, preparation, engineering, deployment, orchestration, control, and tracking – enabling a secure, resilient, and scalable cybersecurity posture. Scope All industries and geographies Services: cybersecurity services, including secure AI transformation Methodology: based on Everest Group’s annual RFIs, buyer interviews, provider briefings, and trends analysis Contents In this report, we examine: The trends, demand drivers, and key enterprise concerns in the global cybersecurity services market Cybersecurity adoption patterns across industries and geographies The evolution of cybersecurity strategies to address AI-induced risks An enterprise playbook for secure AI transformation The market outlook and strategic imperatives for 2025 and beyond -
Viewpoint
Data Security in the AI Era
April 03, 2025In today’s digital economy, data security is a top priority for global enterprises worldwide. As organizations increasingly rely on data for decision-making, fuel innovation, and maintain a competitive edge, the risks associated with data breaches, unauthorized access, and cyber threats continue to escalate. Data security now goes beyond preventing attacks. It safeguards the integrity, confidentiality, and availability of core business assets. In this report, we examine data security’s key dimensions, outlining the essential measures that enterprises must adopt to protect their data assets. The report analyzes data security’s importance in the digital economy and the key differences between data security, cybersecurity, and data privacy. It recommends best practices to secure data across its life cycle. The report assesses the provider landscape, emerging technologies, and generative AI’s dual role in data security. Additionally, it evaluates data security’s future and its influence on digital transformation. Scope All industries and geographies Contents In this report, we examine: Data security’s importance in today’s digital economy Key differences between data security, cybersecurity, and data privacy Best practices to secure data across its life cycle Evolving provider landscape and emerging technologies Generative AI’s impact on data security Future trends shaping data security and digital transformation -
March 19, 2025Watch Everest Group experts Yugal Joshi, Partner, Alisha Mittal, Vice President, Mukesh Ranjan, Vice President, and Akshat Vaid, Partner, for an exciting webinar that will redefine how you view the future of the engineering and IT technology space. Get ready for a deep dive into the transformative trends due to shape engineering and IT services in 2025. From the unstoppable rise of AI to breakthrough innovations on the horizon, our panel will deliver powerful insights into what’s next for the industry and how you can take advantage of this pivotal moment. Expect engaging discussions, bold predictions, and data-driven insights designed to empower enterprises and service providers to navigate this key era. This is your chance to learn how to leverage technology trends, outpace the competition, and thrive in a rapidly evolving landscape. Don’t miss this high-impact session—your roadmap to 2025 starts here. What questions did the webinar answer? As a services provider, which areas should you invest in during 2025 for strategic growth? As an enterprise, what should you look for in outsourcing partners in 2025?
-
Feb. 28, 2025Cloud computing, IoT devices, and IT-OT convergence have significantly expanded enterprises' attack surfaces, making them more vulnerable to advanced cyber threats. Organizations struggle with managing complex security environments, bridging talent shortages, and balancing budget constraints while ensuring robust cybersecurity. As a result, they increasingly turn to Managed Detection and Response (MDR) providers for real-time threat visibility, automated incident containment, and seamless security integration. Providers are addressing these challenges by integrating cutting-edge innovations such as generative AI-driven threat detection, incident response, threat investigation, security-operations-center-as-a-service for scalable cloud-based operations, and extended detection and response capabilities for holistic telemetry coverage. IT and OT security’s growing convergence has also fueled the demand for unified security operations centers capable of managing diverse digital ecosystems. In this report, we assess 29 global MDR providers featured on the Managed Detection and Response (MDR) Services PEAK Matrix® Assessment 2025. The assessment is based on Everest Group’s annual RFI process for the calendar year 2024, interactions with leading MDR providers, client reference checks, and an ongoing analysis of the MDR services market. Scope All industries and geographies Contents In this report, we examine: MDR Services PEAK Matrix® assessment characteristics and providers’ positioning Key sourcing considerations for enterprises selecting MDR providers Providers’ key strengths and limitations Membership(s) Cybersecurity Sourcing and Vendor Management
-
Feb. 11, 2025Watch Everest Group experts Rohan Pant, Vice President, Ricky Sundrani, Partner, and Richa Tapadia, Practice Director, for an insightful webinar on the evolving landscape of Cloud and Infrastructure Services (CIS) pricing and deal trends for 2025. As 2024 experienced flat market growth and pricing stability, the next 6-12 months are set to bring significant shifts with far-reaching implications for CIS deals. From anticipated reductions in standard/commodity CIS rates to projected decreases in ACV/TCV for managed services, it is crucial for enterprises and providers to adapt their strategies to remain competitive in an evolving market. This session provided a deep dive into key pricing trends shaping the future of CIS deals, evolving solutions and their impact on pricing strategies, and practical guidance for factoring market changes into your bids. What questions did the webinar answer for the participants? Is being the lowest-cost bidder the silver bullet to winning CIS deals for service providers? How is gen AI impacting CIS deals? What are the most common contracting and pricing models observed for CIS deals?
-
Dec. 20, 2024The Secure Access Service Edge (SASE) services market in the EMEA region is significantly growing, transforming enterprises' networking and security landscape. The shift toward cloud-centric operations, global hybrid workforce expansion, and the increasing adoption of zero-trust principles drive this evolution. These factors are prompting enterprises to integrate network and security functions, enhance user experiences, strengthen security postures, and simplify their IT environment management. In response, leading SASE service providers in the EMEA region are enhancing their SASE services solution portfolio through strategic technology partnerships and capability enhancements. Providers are also significantly investing in innovation through next-generation technologies such as AI-driven threat detection, automation, and generative AI to further improve the performance, reliability, and adaptability of SASE solutions. In this report, we assess 15 SASE providers featured on SASE Services for EMEA Enterprises PEAK Matrix® Assessment 2024 and categorize them as Leaders, Major Contenders, and Aspirants based on their capabilities and offerings. Scope EMEA geography All industries The assessment is based on Everest Group’s RFI process for the calendar year 2024, interactions with leading SASE providers in EMEA, client reference checks, and an ongoing analysis of the SASE services market Contents In this report, we examine: The market impact, vision, and capabilities of 15 providers focused on SASE services in the EMEA region Providers’ key strengths and limitations Enterprise sourcing considerations Memberships Cloud and Infrastructure Services Cybersecurity Sourcing and Vendor Management