Blog
The ‘Hottest’ IT Security Technologies in 2022
Did you catch The ‘Hottest’ IT Security Technologies in 2022 webinar? If not, we are here to share the key takeaways. Steve Piper, CISSP, CEO and Founder of CyberEdge Group joined moderator Brandon Dunlap in this initial kickoff of a five-part webinar series discussing key insights from the 2022 Cyberthreat Defense Report . This webinar focused on which security technologies are most widely deployed and most planned for acquisition in 2022.
The 2022 Cyberthreat Defense Report is now in its 9th year and surveys 1,200 IT security and decision-makers and practitioners in organizations of 500+ employees. The survey is designed to assess organizations’ security posture, perceptions of cyber threats and IT security challenges, current and future IT security investments and IT security practices and strategies. This report is optimal for those looking to see what their peers are doing globally, within their country and in some cases industry specific. Learn where investments have already been made and where organizations are focusing their sights in the coming year.
So, what’s red hot for 2022?
Network Security Deployment Plans
Highest in Use –
- Advanced malware analysis / sandboxing
- Intrusion detection / prevention system (IDS/IPS)
- Secure email gateway (SEG)
Planned for Acquisition –
- Next-generation firewall (FGFW)
- Network behavior analysis (NBA) / Netflow analysis
- Deception technology / distributed honeypots
Endpoint Security Deployment Plans
Highest in Use –
- Basic anti-virus / anti-malware (threat signatures)
- Endpoint detection and response (EDR)
- Data loss / leak prevention (DLP)
Planned for Acquisition –
- Deception technology / honeypots
- Digital forensics / incident resolution
- Disk encryption
Application & Data Security Deployment Plans
Highest in Use –
- API gateway / protection
- Web application firewall (WAF)
- Database firewall
Planned for Acquisition –
- Bot management
- Advanced security analysis (e.g. with machine learning, AI)
- Static/dynamic/interactive application security testing (SAST/DAST/IAST)
Security Management and Operations Deployment Plans
Highest in Use –
- Active Directory protection
- Cyber risk management and reporting
- Security configuration management (SCM)
Planned for Acquisition –
- Advanced security analytics (e.g. with machine learning, AI)
- Threat intelligence platform (TIP) or service
- User and entity behavior analytics (UEBA)
Identity and Access Management (IAM) Deployment Plans
Highest in Use –
- Password management / automated reset
- Adaptive/risk-based authentication
- Two-/multi-factor (2FA/MFA) authentication
Planned for Acquisition –
- Biometrics
- Smart cards
- Federated identity management (SAML, Oauth)
For more insights, download the 2022 Cyberthreat Defense Report or watch Ransomware Deep Dive: Preparing for the Inevitable . Save the date and register for the remainder of the series:
- September 14, 2022 at 1:00 p.m. ET – The Evolution of Risk-based Vulnerability Management
- October 12, 2022 at 1:00 p.m. ET – Strategies for Recruiting and Retaining Top IT Security Talent
- December 7, 2022 at 1:00 p.m. ET – Top Five Cybersecurity Predictions for 2023