Мои любимые прогнозы Gartner про ИБ

Мои любимые прогнозы Gartner про ИБ
Выбрал из различных отчетов и презентаций Gartner несколько интересных прогнозов по ИБ (люблю их использовать в своих презентациях).

SOC и MSSP
  • By 2020, 65% of worldwide managed security service providers (MSSPs) will offer managed detection and response (MDR)-type services.
  • By 2020, 60% of enterprises' information security budgets will be allocated for rapid detection and response approaches, up from less than 30% in 2016.

UEBA и SIEM
  • By the end of 2017, at least 60% of major SIEM vendors will incorporate advanced analytics and UEBA functionality into their products.
  • By 2018, at least 30% of major SIEM vendors will incorporate advanced analytics and UEBA functionality into their products. 
  • By 2018, 25% of security products used for detection will have some form of advanced analytics built into them.
  • By 2018, prescriptive analytics will be deployed in at least 10% of UEBA products, up from zero today.
  • By 2018, at least four UEBA technology companies will be acquired by SIEM, data loss prevention (DLP) or other large technology vendors supporting security operations use cases.
  • By 2020, at least 60% of major cloud access security broker (CASB) vendors and 25% of major SIEM and DLP vendors will incorporate advanced analytics and UEBA functionality in to their products, either through acquisitions, partnerships or natively. 
  • By 2020, less than five stand-alone UEBA solutions will remain in the market, with other vendors focusing on specific use cases and outcomes.

IDM/IGA
  • By 2018, 25% of organizations —up from less than 5% today —will reduce data leakage incidents by 33% by reviewing privileged session activity.
  • By 2018, 50% of organizations will use authentication methods other than passwords for administrative access, up from 20% in 2015.
  • By 2019, 40% of IDaaS implementations will replace on-premises IAM implementations, up from 10% today.
  • By 2019, 40% of organizations with identity governance and administration (IGA) deployments will have invested in data access governance (DAG) capabilities, up from <10%.
  • By 2019, organizations with complementary/integrated IGA and DAG capabilities will suffer 30% fewer data breaches.
  • By 2020, 40% of IAM purchases will use the IDaaS delivery model —up from less than 20% in 2016.
  • By 2020, 40% of identity and access management (IAM) purchases will use the identity and access management as a service (IDaaS) delivery model — up from less than 20% in 2016.

DLP
  • By 2018, 40% of enterprises will manage data loss by leveraging cloud gateways and enterprise mobility management, bypassing legacy DLP infrastructure.
  • By 2018, 90% of organizations will implement at least one form of integrated DLP, up from 50% today.
  • By 2018, less than 10% of organizations with integrated DLP will have a well-defined data security governance program in place, up from near zero today.
  • By 2020, 30% of organizations targeted by major cyberattackswill spend more than two months cleansing backup, resultingin delayed recoveries. 

Cloud
  • By 2018, cloud service providers with one or more third-party security evaluations will comprise 90% of the market for cloud services.
  • By 2018, 40% of Office 365 deployments will rely on third-party tools to fill gaps in security and compliance, which is a major increase from less than 10% in 2015.

WAF и UTM 
  • By year-end 2020, more than 70% of public web applications protected by a web application firewall (WAF) will use WAFs delivered as a cloud service or internet-hosted virtual appliance — up from less than 25% today.
  • By 2020, 50% of SMBs will use mobility or wireless management capabilities from their UTM platforms to enforce distinctive policies, up from 10% today.
  • Through at least 2020, the firewall markets for SMB and enterprise firewalls will remain distinct.

Уязвимости, угрозы и инциденты
  • By 2018, 40% of large enterprises will have formal plans to address aggressive cybersecurity business disruption attacks, which is up from 0% in 2015.
  • By 2019, digital security incidents affecting safety will result in changes to safety regulations to address digital security.
  • By 2020, 30% of organizations targeted by major cyberattackswill spend more than two months cleansing backup, resultingin delayed recoveries. 
  • By 2020, 60% of digital businesses will suffer major service failures due to the inability of IT security teams to manage digital risk.
  • By 2020, a third of successful attacks experienced by enterprises will be on their shadow IT resources.
  • Through 2020, 99% of vulnerabilities exploited will continue to be ones known by security and IT professionals for at least one year.
  • By 2020, organizations where the mandate for information security comes from IT will suffer significant breaches, more than 3x times as often as those where it is sponsored by business leaders.
  • By 2020, sophisticated criminals will be able to beat 90% of the organizations who have deployed advanced analytic systems.
  • Among enterprises without formalized control and management of citizen development policies, at least 50% will encounter substantial data, process integrity and security vulnerabilities by 2020.

Прочее
  • By 2018, data-centric audit and protection products will replace disparate siloed data security tools in 25% of large enterprises, up from less than 2% today.
  • By 2019, enterprises will spend over $1.2B on application security, doubling the $600M spent in 2014.
  • By 2020, line of business managers will represent the largest segment of information security governance bodies in 50% of organizations.
Alt text
Обращаем внимание, что все материалы в этом блоге представляют личное мнение их авторов. Редакция SecurityLab.ru не несет ответственности за точность, полноту и достоверность опубликованных данных. Вся информация предоставлена «как есть» и может не соответствовать официальной позиции компании.

Ищем темную материю и подписчиков!

Одно найти легче, чем другое. Спойлер: это не темная материя

Станьте частью научной Вселенной — подпишитесь

Andrey Prozorov

Информационная безопасность в России и мире