- Major Studies
The leaders’ circle includes Accenture, AT&T, Atos|Syntel, HCL, IBM, Secureworks, Symantec, and Wipro.
The innovators’ circle includes BAE Systems, British Telecom, DXC, NTT, Orange Cyberdefense, TCS, Telefonica, and Trustwave.
The disruptors’ circle includes Alert Logic, Capgemini, CenturyLink, Cognizant, Fujitsu, Infosys, Tech Mahindra, and Verizon.
The challengers’ circle includes CGI, T-Systems, UST Global, and Zensar
These four categories are illustrated graphically in Figure 1 from the full report (click to enlarge):
Choose a security product with built-in AI and automation capabilities.
With cyberattacks becoming more sophisticated, it is prudent for enterprises to acquire security tools with built-in AI/ML capabilities that reduce incident response time and enable automated response.
Using orchestration and analytics, an enterprise can unify disparate security tools. This will help mitigate multiple end-of-life (EOL) security issues and reduce false alarms.
Take proactive approach toward robust GRC mechanisms.
For effective governance, risk and compliance (GRC) mechanisms, enterprises should clearly define the security operating model as well as the roles and responsibilities of contracted services. This will avoid some of the common challenges, particularly misconfiguration and inadequate controls.
Enroll third parties to conduct external audits, objective penetration testing and other vulnerability assessments, and platform evaluations to ensure installations are secure and compliant to standards.
Leverage Zero Trust models to protect critical data and intellectual property.
The traditional ways of securing access (e.g. passwords) are no longer enough to prevent unauthorized access. Hence, it is important to deploy security measures that help provide contextual information for user access and connect user with application using adaptive access.
This includes adoption of cloud-native Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) solutions, which leverage AI/ML technology.
Use application containerization to enable BYOD policies.
As the prevalence of unmanaged devices continue to pose a threat to the BYOD environment, it is crucial for businesses to manage, monitor, and secure access.
In such scenarios, application containerization helps segregate personal data from corporate data by using Advanced Encryption Standard (AES). Data leakage can be avoided using Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) solutions.
The report also features highly detailed, comprehensive RadarView Profiles of the top 28 service providers along with their assets and experience in combating the ever-growing security and privacy threats. This is also a good reflection of how the service provider landscape has evolved, not only in terms of categorization but also in the way they are investing in developing talent, enhancing organizational structures, expanding geographic focus, and strengthening their partner network. Accordingly, the service providers are judged on practice maturity, partnership ecosystem, and investments and innovation.
This Research Byte is a brief overview of the full Cybersecurity Services RadarView 2020 Report (click for pricing).