The leaders’ circle includes Accenture, AT&T, Atos|Syntel, HCL, IBM, Secureworks, Symantec, and Wipro.
The innovators’ circle includes BAE Systems, British Telecom, DXC, NTT, Orange Cyberdefense, TCS, Telefonica, and Trustwave.
The disruptors’ circle includes Alert Logic, Capgemini, CenturyLink, Cognizant, Fujitsu, Infosys, Tech Mahindra, and Verizon.
The challengers’ circle includes CGI, T-Systems, UST Global, and Zensar
These four categories are illustrated graphically in Figure 1 from the full report (click to enlarge):
“As the security perimeter shifts away from the data center to the cloud, service providers continue to enhance their cloud capabilities to suit today’s enterprise multi-cloud environment,” said Avasant Research Leader Gaurav Dewan. “Additionally, with the Internet of Things and Industry 4.0 initiatives, service providers are introducing dedicated practice units and security modules focused on driving growth in connected IoT devices and security cadence, particularly for industrial control systems.”Choose a security product with built-in AI and automation capabilities.
With cyberattacks becoming more sophisticated, it is prudent for enterprises to acquire security tools with built-in AI/ML capabilities that reduce incident response time and enable automated response.
Using orchestration and analytics, an enterprise can unify disparate security tools. This will help mitigate multiple end-of-life (EOL) security issues and reduce false alarms.
Take proactive approach toward robust GRC mechanisms.
For effective governance, risk and compliance (GRC) mechanisms, enterprises should clearly define the security operating model as well as the roles and responsibilities of contracted services. This will avoid some of the common challenges, particularly misconfiguration and inadequate controls.
Enroll third parties to conduct external audits, objective penetration testing and other vulnerability assessments, and platform evaluations to ensure installations are secure and compliant to standards.
Leverage Zero Trust models to protect critical data and intellectual property.
The traditional ways of securing access (e.g. passwords) are no longer enough to prevent unauthorized access. Hence, it is important to deploy security measures that help provide contextual information for user access and connect user with application using adaptive access.
This includes adoption of cloud-native Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) solutions, which leverage AI/ML technology.
Use application containerization to enable BYOD policies.
As the prevalence of unmanaged devices continue to pose a threat to the BYOD environment, it is crucial for businesses to manage, monitor, and secure access.
In such scenarios, application containerization helps segregate personal data from corporate data by using Advanced Encryption Standard (AES). Data leakage can be avoided using Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) solutions.
The report also features highly detailed, comprehensive RadarView Profiles of the top 28 service providers along with their assets and experience in combating the ever-growing security and privacy threats. This is also a good reflection of how the service provider landscape has evolved, not only in terms of categorization but also in the way they are investing in developing talent, enhancing organizational structures, expanding geographic focus, and strengthening their partner network. Accordingly, the service providers are judged on practice maturity, partnership ecosystem, and investments and innovation.
This Research Byte is a brief overview of the full Cybersecurity Services RadarView 2020 Report (click for pricing).
E-Commerce Complexity Causes Customer Experience Challenges
Global Crises Fueling New Investments in Supply Chain Management
Digital Workplace—Rising Star of New Technology Trends Study
NFTs: More Than Just Digital Art
Avoid the Watermelon Effect—Focus on Customer Experience
IT Spending as a Percentage of Revenue by Industry
IT Spending in the Insurance Industry
IT Spending in the Retail Industry