Hype Cycle™ for Security Operations, 2021

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME


EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

Key Insights into Your SOC Investments

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

Gartner says that security operations is “not simply a department, team or set of technologies” but rather “a group of well-executed processes performed by personnel aiming to protect the organization from harm.” Gartner also calls out that “security personnel require modern security technologies to quickly detect and mitigate threats and reduce exposure.”*

Cortex® by Palo Alto Networks is a single, adaptable platform for security operations to protect the entire organization. Cortex ingests any data for processing by multiple analytics methods, enriches with threat and risk context from threat intelligence and built-in attack surface management, and automates detection and key aspects of investigation and response.

Read the Gartner Hype Cycle for Security Operations, 2021 report where we believe you will learn:

  • Why a renewed approach to looking at exposure via external attack surface management (EASM) can help organizations prioritize risks better
  • The continued importance of EDR, and key drivers behind the increasing need for extended detection and response (XDR), such as reduced complexity and less maintenance
  • Key drivers and business impact behind the adoption of SOAR, and general recommendations of how to evaluate SOAR to best suit your requirements

Download a complimentary copy of the Gartner report, Hype Cycle for Security Operations, 2021.


* Shilpi Handa and Pete Shoard, “Hype Cycle for Security Operations, 2021,” Gartner, 23 July 2021.

Gartner and Hype Cycle are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content
LP-3 Sec 1 Content

Learn more about
security operations

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME

EDIT ME