* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Saturday, August 23, 2025
Earth-News
  • Home
  • Business
  • Entertainment
    How to watch ‘F1: The Movie’ on Prime Video – About Amazon

    Experience the Thrill: How to Stream ‘F1: The Movie’ on Prime Video

    FOX One is now available on Prime Video: Here’s everything to know – About Amazon

    FOX One is now available on Prime Video: Here’s everything to know – About Amazon

    What Are Our Predictions for Taylor Swift’s ‘Life of a Showgirl’ Based on What She’s Told Us So Far? – yahoo.com

    Uncover the Hidden Surprises in Taylor Swift’s ‘Life of a Showgirl’ – Can You Decode Her Clues?

    Bama Dining Serving Up New Food, Entertainment – UA News Center

    Bama Dining Launches Thrilling New Food and Entertainment Experiences

    The latest on Williams-Brice Stadium renovations, entertainment district – On3

    Discover the Thrilling New Upgrades Coming to Williams-Brice Stadium and Its Vibrant Entertainment District!

    1000+ Entertainment Leaders Release Open Letter Criticizing TIFF’s Handling of Film – Creative Community for Peace

    1000+ Entertainment Leaders Release Open Letter Criticizing TIFF’s Handling of Film – Creative Community for Peace

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Alcorn State awarded grant to boost STEM with VR technology – WJTV

    Alcorn State Secures Grant to Transform STEM Education Through Cutting-Edge VR Technology

    Hyundai: The Only Way To Beat China Is To Embrace Technology – InsideEVs

    Hyundai’s Bold Strategy to Outpace China with Cutting-Edge Technology

    Teaching older adults how to use technology – WWNY

    Empowering Older Adults to Master Technology with Confidence

    Denver man receives pacemaker using new technology – CBS News

    Denver Man’s Life Transformed by Revolutionary Pacemaker Technology

    Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

    Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

    YSU to celebrate launch of new radiology technology program – WKBN.com

    YSU Launches Exciting New Radiology Technology Program Celebration

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment
    How to watch ‘F1: The Movie’ on Prime Video – About Amazon

    Experience the Thrill: How to Stream ‘F1: The Movie’ on Prime Video

    FOX One is now available on Prime Video: Here’s everything to know – About Amazon

    FOX One is now available on Prime Video: Here’s everything to know – About Amazon

    What Are Our Predictions for Taylor Swift’s ‘Life of a Showgirl’ Based on What She’s Told Us So Far? – yahoo.com

    Uncover the Hidden Surprises in Taylor Swift’s ‘Life of a Showgirl’ – Can You Decode Her Clues?

    Bama Dining Serving Up New Food, Entertainment – UA News Center

    Bama Dining Launches Thrilling New Food and Entertainment Experiences

    The latest on Williams-Brice Stadium renovations, entertainment district – On3

    Discover the Thrilling New Upgrades Coming to Williams-Brice Stadium and Its Vibrant Entertainment District!

    1000+ Entertainment Leaders Release Open Letter Criticizing TIFF’s Handling of Film – Creative Community for Peace

    1000+ Entertainment Leaders Release Open Letter Criticizing TIFF’s Handling of Film – Creative Community for Peace

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Alcorn State awarded grant to boost STEM with VR technology – WJTV

    Alcorn State Secures Grant to Transform STEM Education Through Cutting-Edge VR Technology

    Hyundai: The Only Way To Beat China Is To Embrace Technology – InsideEVs

    Hyundai’s Bold Strategy to Outpace China with Cutting-Edge Technology

    Teaching older adults how to use technology – WWNY

    Empowering Older Adults to Master Technology with Confidence

    Denver man receives pacemaker using new technology – CBS News

    Denver Man’s Life Transformed by Revolutionary Pacemaker Technology

    Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

    Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

    YSU to celebrate launch of new radiology technology program – WKBN.com

    YSU Launches Exciting New Radiology Technology Program Celebration

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Technology

The top 10 technologies defining the future of cybersecurity

July 24, 2023
in Technology
The top 10 technologies defining the future of cybersecurity
Share on FacebookShare on Twitter

July 24, 2023 9:31 AM

1 Lead Story Why So Many Organizations Are Getting Zero Trust Wrong

Head over to our on-demand library to view sessions from VB Transform 2023. Register Here

CISOs face a tough balancing act. They must protect new digital transformation strategies that deliver revenue, and keep fragmented legacy systems secure. At the same time they have to battle the siege on identities, and get more work done with a smaller cybersecurity staff.

Consolidating tech stacks, together with gaining access to new technologies, is the solution many are adopting. A well-orchestrated consolidation strategy delivers greater visibility and control, cost savings and scale.

That’s thanks to advances in AI and machine learning (ML) that are strengthening cybersecurity platforms. Generative AI, for example, brings greater precision to cybersecurity while alleviating the heavy workloads and alert-fatigue that burden SecOps teams.

The goal: Fast-track new cybersecurity tech while reducing risk 

Legacy tech stacks have gaps, and attackers are fine-tuning their tradecraft to exploit them. One of the widest gaps is between identities and endpoints. “It’s one of the biggest challenges that people … grapple with today,” Michael Sentonas, president of CrowdStrike, told VentureBeat in a recent interview. He had conducted a demonstration intended “to show some of the challenges with identity and the complexity … [because] it’s a critical problem. And if you can solve that, you can solve a big part of the cyber problem that an organization has.” 

Event

VB Transform 2023 On-Demand

Did you miss a session from VB Transform 2023? Register to access the on-demand library for all of our featured sessions.

Register Now

Three-quarters of security and risk-management professionals interviewed by Gartner say they are actively pursuing a vendor consolidation strategy for their cybersecurity tech stacks. And 22% more are planning to do so by 2025.

Gartner’s latest survey on consolidation concentrated on which direction enterprises are going in this area. It found that the top five areas through which organizations are pursuing consolidation are data security platforms (DSPs), cloud native application protection platforms (CNAPP), identity and access management (IGA, AM, PAM), extended detection and response (XDR) and secure access service edge (SASE).

CISOs from insurance, financial services and professional services enterprises tell VentureBeat that their goal is to access the latest AI and ML technologies to help reduce tool sprawl and alert-fatigue, help close skill gaps and shortages, and eliminate response inefficiencies.

Securing data across integrated networks, closing security gaps across cloud platforms, protecting identities and hardening endpoint security are organizations' most common motivations for pursuing a consolidation strategy. Source: Gartner, Chief Information Security Officer Persona Priorities, 26 April 2023Securing data across integrated networks, closing security gaps across cloud platforms, protecting identities, and hardening endpoint security are organizations’ most common motivations for pursuing a consolidation strategy. Source: Gartner, Chief Information Security Officer Persona Priorities, 26 April 2023

AI is now part of cybersecurity’s DNA  

“AI is incredibly, incredibly effective [at] processing large amounts of data and classifying this data to determine what is good and what’s bad,” said Vasu Jakkal, corporate vice president for Microsoft Security, Compliance, Identity and Privacy, in her keynote at RSAC 2023. “At Microsoft, we process 24 trillion signals every single day, and that’s across identities and endpoints and devices and collaboration tools, and much more. And without AI, we simply could not tackle this.” 

Deep AI and ML expertise are now table stakes for staying competitive in cybersecurity. Even the most efficient, well-staffed and well-equipped SecOps team isn’t going to catch every intrusion attempt, breach and insider attack. Major cybersecurity vendors, including Blackberry Persona, Broadcom, Cisco, CrowdStrike, CyberArk, Cybereason, Ivanti, SentinelOne, Microsoft, McAfee, Palo Alto Networks, Sophos, VMWare Carbon Black and Zscaler have integrated AI into their core platforms, helping them sell a consolidation vision. Each sees a win-win — for their customers, and for their own DevOps teams, which are fast-tracking new AI- and ML-based enhancements into future releases.

CrowdStrike, for example, is successfully selling tech stack consolidation as a growth strategy, with its Falcon Insight XDR consolidation engine. Palo Alto Networks is another. Speaking at the company’s Ignite ’22 cybersecurity conference, Nikesh Arora, chairman and CEO, remarked that “customers … want the consolidation because right now, customers are going through the three biggest transformations ever: They’re going to network security transformation, they’re going through a cloud transformation, and [though] many of them don’t know … they’re about to go to a SOC transformation.” 

The technologies proving effective at meeting CISOs’ greatest challenges 

Attackers know how to exploit perimeter-based systems quickly and are constantly improving their techniques to penetrate networks undetected. They have become so advanced that they can often easily overwhelm the fragmented, legacy-based approaches many organizations still rely on for their cybersecurity.

AI and ML are instrumental in providing real-time detection and automated attack responses. CISOs tell VentureBeat that the big payoff is having a single system for all monitoring, prediction and response — a system with a set of integrated apps and tools that can interpret and act on data in real time. Together, these factors are driving the global market for AI-based cybersecurity technology and tools to grow by an expected $19 billion between 2021 and 2025.  

Here are the technologies proving most effective in helping CISOs balance the many demands on their teams while keeping their organizations secure from internal and external attacks: 

1. Endpoint detection and response (EDR)

EDR addresses the challenges of detecting and responding to advanced threats that can evade traditional endpoint security systems. It uses behavioral analysis to detect attacks in real time. EDR has also proven effective in helping SOC analysts and security teams detect and respond to ransomware and other attack techniques that can evade traditional signature-based antivirus apps and platforms. CISOs tell VentureBeat they rely on EDR to protect their highest-value assets first.

Leading vendors include CrowdStrike, SentinelOne, Microsoft Defender for Endpoint, Trend Micro and VMware Carbon Black. 

2. Endpoint protection platforms (EPPs)

Considered essential when revamping tech stacks to make them more integrated and able to scale and protect more endpoints, EPPs have proven their value to the CISOs whom VentureBeat interviewed for this article. They’re effective in battling emerging threats, including new malware exploits. One financial services CISO said that the advances in AI and ML in their company’s endpoint protection platform had stopped intrusions before they progressed into corporate networks.

Vendors are differentiating their EPP platforms on advanced analytics and greater endpoint visibility and control. EPPs are becoming increasingly data-driven. EPPs with ransomware detection and response include Absolute Software, whose Ransomware Response builds on the company’s expertise in endpoint visibility, control and resilience. Other vendors include Broadcom (Symantec), Bitdefender, CrowdStrike, Cisco, Cybereason, Deep Instinct, Trellix, Microsoft, SentinelOne, Sophos, Trend Micro and VMware Carbon Black. 

3. Extended detection and response (XDR)

XDR platforms aggregate and correlate security alerts and telemetry from an organization’s endpoints, network, cloud and other data sources. CISOs tell VentureBeat that a well-implemented XDR solution outperforms legacy security tools in threat detection, investigation and automated response. XDR reduces costs, boosts security operations efficiency and lowers risk.

Vendors continue to add more APIs, supporting an open-architecture approach to integration so their platforms can accept, analyze and respond to telemetry data in real time. According to a vendor interview with VentureBeat, Palo Alto Networks’ Cortex XDR has reduced Rolls-Royce’s alert volumes by 90% and response times by 95%. Other leading vendors include CrowdStrike, Cynet, Microsoft and Trend Micro. 

4. Identity threat detection and response (ITDR)

ITDR platforms protect a company’s identity infrastructure from sophisticated attacks. They help organizations monitor, detect and respond to identity threats as identity systems become both more critical and more vulnerable.

CISOs tell VentureBeat that combining ITDR and IAM improvements is essential to protect identities under siege, especially in healthcare and manufacturing, where attackers know there are soft targets. Microsoft has over 30,000 Azure AD Premium P2 customers gaining identity protection with Azure AD Identity Protection, for example. Other leading vendors include Netwrix and Silverfort.

5. Mobile threat defense (MTD)

MTD solutions protect smartphones and tablets from advanced threats that can bypass traditional security controls that are part of fragmented legacy tech stacks. MTD protects mobile apps, devices and networks from phishing, real-time zero-day threats, and advanced attack techniques based on identity and privileged access credential theft.

Ivanti’s approach to protecting mobile clients in highly regulated industries sets the technology standard in MTD. Ivanti Neurons for MTD is built on the Ivanti Neurons for MDM and Ivanti Endpoint Manager Mobile clients and can be deployed on managed Android, iOS and iPadOS devices. Other leading vendors include CheckPoint, Lookout, Proofpoint, Pradeo, Symantec, VMWare and Zimperium.

6. Microsegmentation

Microsegmentation restricts lateral movement during a breach by separating workloads by identity. It also addresses poorly isolated workloads that allow attackers to spread laterally. CISOs tell VentureBeat that they have been able to streamline deployments by isolating high-risk workloads and using tools that assist in making contextual policy recommendations.

Microsegmentation reduces unauthorized workload communication and the blast radius of an attack, making it a pivotal technology for the future of cybersecurity and zero trust. Leading vendors include Illumio, Akamai/Guardicore and VMWare. 

7. Secure access service edge (SASE)

CISOs tell VentureBeat that SASE has the potential to streamline consolidation plans while factoring in zero-trust network access (ZTNA) to secure endpoints and identities. This makes it a useful platform for driving consolidation.

Legacy network architectures can’t keep up with cloud-based workloads, and their perimeter-based security is proving too much of a liability, CIOs and CISOs tell VentureBeat. Legacy architectures are renowned for poor user experiences and wide security gaps. Esmond Kane, CISO of Steward Health, advises: “Understand that — at its core — SASE is zero trust. We’re talking about identity, authentication, access control, and privilege. Start there and then build out.”

“One of the key trends emerging from the pandemic has been the broad rethinking of how to provide network and security services to distributed workforces,” writes Garrett Bekker, senior research analyst, security at 451 Research, part of S&P Global Market Intelligence, in a 451 Research note titled “Another day, another SASE fueled deal as Absolute picks up NetMotion.”

Garrett continues, “This shift in thinking, in turn, has fueled interest in zero-trust network access (ZTNA) and secure access service edge.” Leading vendors include Absolute, Cato Networks, Cisco, Cloudflare, Forcepoint, Open Systems, Palo Alto Networks, Versa Networks, VMWare SASE and Zscaler. 

8. Secure service edge (SSE)

To secure SaaS, web, and private applications, SSE integrates secure web gateway (SWG), cloud access security broker (CASB) and ZTNA into a single cloud platform. SSE’s workflows are also proving effective at simplifying the management of different point tools. And CISOs tell VentureBeat that SSE is effective for simplifying, securing and improving remote user experiences.

The big payoff for CISOs is how SSE can consolidate security tools into a unified cloud platform and standardize policy enforcement. Leading vendors include Broadcom, Cisco, Netskope and Zscaler.

9. Unified endpoint security (UES)

UES streamlines protection for every endpoint device, including PCs, mobile devices and servers, by consolidating siloed endpoint security tools into a single platform. UES solves the problems inherent in decentralized tools, like limited visibility, detection and response.

CISOs at leading insurance and financial services firms tell VentureBeat that UES is their go-to platform for ensuring that the security hygiene of an acquired company is in good shape before they move forward with broader integration.

Reduced licensing costs, unified visibility and faster response are key benefits, according to CISOs interviewed by VentureBeat. Leading vendors include BlackBerry, IBM Security MaaS360, Ivanti Neurons for UEM, Microsoft, VMware and ManageEngine. Ivanti Neurons for UEM is unique among UES vendors as its endpoint clients deliver real-time intelligence and can self-heal and self-secure.   

10. Zero-trust network access (ZTNA)

ZTNA enforces least-privileged access in every application, resource and endpoint on a network while continuously monitoring all network activity. It assumes that no connection or resource request or use is trusted. Therefore it restricts connections to any asset, endpoint or resource to authorized users, devices and applications based on verified identity and context.

Gartner says hybrid work is a strong adoption driver for ZTNA, and that it has led to ZTNA being integrated into security service edge (SSE). According to Absolute Software’s 2023 Resilience Index, “zero-trust network access (ZTNA) helps [enterprises] move away from the dependency on username/password and [toward relying] on contextual factors, like time of day, geolocation, and device security posture, before granting access to enterprise resources.”

Zero-trust strategies effectively reduce the attack surface for remote connections by restricting access to authorized applications only. Absolute, Akamai, Cato Networks, Check Point, Cisco, Cloudflare, Forcepoint, Fortinet, Okta, Palo Alto Networks, Perimeter 81 and Zscaler are the leading vendors in the ZTNA market.

Why these 10 core technologies are driving cybersecurity’s consolidation 

Attackers are aware of the gaps in legacy tech stacks and are constantly working to capitalize on them. The widening gap between identities and endpoint security is one of the largest and fastest-growing gaps. Industry leaders such as CrowdStike, Palo Alto Networks and Zscaler are focused on eliminating it.

That’s good news for CISOs attempting to balance support for new digital initiatives with consolidating their tech stacks to reduce legacy risks and getting more work done with a smaller staff.

AI-based platforms, including XDR, deliver the unified visibility and control CISOs and their teams need to reduce risk and protect threat surfaces. Cloud-based models, including SASE and SSE, are making it possible for CISOs to enable consistent policy enforcement. And ZTNA enforces least privileged access, with its core components shutting off lateral movement when a breach occurs.

VentureBeat’s mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : VentureBeat – https://venturebeat.com/security/the-top-10-technologies-defining-the-future-of-cybersecurity/

Tags: definingTechnologiestechnology
Previous Post

Twisted Metal debuts on Peacock on July 27 as latest game-to-streaming adaptation

Next Post

Tencent to acquire majority shares in Dying Light dev Techland

Crossings: How Road Ecology is Shaping the Future of Our Planet – Living on Earth

Crossings: How Road Ecology is Shaping the Future of Our Planet

August 23, 2025
Toyota Friday Night Rivals kicks off season with Elizabethton at Science Hill – WCYB

Toyota Friday Night Rivals Ignite the Season with Elizabethton vs. Science Hill Showdown

August 23, 2025
Star Trek as Refuge for the Science-Minded – The Provincetown Independent

How Star Trek Ignites Passion and Empowers the Science-Minded

August 23, 2025
Refresh your wardrobe at these 11 QTS award-winning fashion and lifestyle stores – Time Out Worldwide

Transform Your Look with These 11 Must-Visit Fashion and Lifestyle Stores

August 23, 2025
Alcorn State awarded grant to boost STEM with VR technology – WJTV

Alcorn State Secures Grant to Transform STEM Education Through Cutting-Edge VR Technology

August 23, 2025
Is Mastantuono in line for a start this Sunday? – Yahoo Sports

Is Mastantuono Set to Make His Starting Debut This Sunday?

August 23, 2025
‘Urgent action’ needed to protect workers from heat stress in warming world, UN says – Reuters

Urgent Action Needed to Shield Workers from Rising Heat Risks in a Warming World

August 22, 2025
The United States’ Biggest Vulnerability in the Trade War: Its Knowledge Economy – World Politics Review

The United States’ Greatest Weakness in the Trade War: Its Knowledge Economy

August 22, 2025
How to watch ‘F1: The Movie’ on Prime Video – About Amazon

Experience the Thrill: How to Stream ‘F1: The Movie’ on Prime Video

August 22, 2025
Willis Knighton Health in Louisiana joins Mayo Clinic Care Network – Mayo Clinic News Network

Willis Knighton Health Teams Up with Mayo Clinic Care Network to Elevate Patient Care in Louisiana

August 22, 2025

Categories

Archives

August 2025
MTWTFSS
 123
45678910
11121314151617
18192021222324
25262728293031
« Jul    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (785)
  • Economy (805)
  • Entertainment (21,684)
  • General (16,619)
  • Health (9,845)
  • Lifestyle (818)
  • News (22,149)
  • People (807)
  • Politics (814)
  • Science (16,018)
  • Sports (21,304)
  • Technology (15,786)
  • World (786)

Recent News

Crossings: How Road Ecology is Shaping the Future of Our Planet – Living on Earth

Crossings: How Road Ecology is Shaping the Future of Our Planet

August 23, 2025
Toyota Friday Night Rivals kicks off season with Elizabethton at Science Hill – WCYB

Toyota Friday Night Rivals Ignite the Season with Elizabethton vs. Science Hill Showdown

August 23, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version