Blog

The ‘Hottest’ IT Security Technologies in 2022

Aug 23, 2022

Hottest IT Security Tech Did you catch The ‘Hottest’ IT Security Technologies in 2022 webinar? If not, we are here to share the key takeaways. Steve Piper, CISSP, CEO and Founder of CyberEdge Group joined moderator Brandon Dunlap in this initial kickoff of a five-part webinar series discussing key insights from the 2022 Cyberthreat Defense Report . This webinar focused on which security technologies are most widely deployed and most planned for acquisition in 2022.

The 2022 Cyberthreat Defense Report is now in its 9th year and surveys 1,200 IT security and decision-makers and practitioners in organizations of 500+ employees. The survey is designed to assess organizations’ security posture, perceptions of cyber threats and IT security challenges, current and future IT security investments and IT security practices and strategies. This report is optimal for those looking to see what their peers are doing globally, within their country and in some cases industry specific. Learn where investments have already been made and where organizations are focusing their sights in the coming year.

So, what’s red hot for 2022?

Network Security Deployment Plans

Highest in Use –

  1. Advanced malware analysis / sandboxing
  2. Intrusion detection / prevention system (IDS/IPS)
  3. Secure email gateway (SEG)

Planned for Acquisition –

  1. Next-generation firewall (FGFW)
  2. Network behavior analysis (NBA) / Netflow analysis
  3. Deception technology / distributed honeypots

Endpoint Security Deployment Plans

Highest in Use –

  1. Basic anti-virus / anti-malware (threat signatures)
  2. Endpoint detection and response (EDR)
  3. Data loss / leak prevention (DLP)

Planned for Acquisition –

  1. Deception technology / honeypots
  2. Digital forensics / incident resolution
  3. Disk encryption

Application & Data Security Deployment Plans

Highest in Use –

  1. API gateway / protection
  2. Web application firewall (WAF)
  3. Database firewall

Planned for Acquisition –

  1. Bot management
  2. Advanced security analysis (e.g. with machine learning, AI)
  3. Static/dynamic/interactive application security testing (SAST/DAST/IAST)

Security Management and Operations Deployment Plans

Highest in Use –

  1. Active Directory protection
  2. Cyber risk management and reporting
  3. Security configuration management (SCM)

Planned for Acquisition –

  1. Advanced security analytics (e.g. with machine learning, AI)
  2. Threat intelligence platform (TIP) or service
  3. User and entity behavior analytics (UEBA)

Identity and Access Management (IAM) Deployment Plans

Highest in Use –

  1. Password management / automated reset
  2. Adaptive/risk-based authentication
  3. Two-/multi-factor (2FA/MFA) authentication

Planned for Acquisition –

  1. Biometrics
  2. Smart cards
  3. Federated identity management (SAML, Oauth)

For more insights, download the 2022 Cyberthreat Defense Report or watch Ransomware Deep Dive: Preparing for the Inevitable . Save the date and register for the remainder of the series: