-
Report details
-
26
Figures
-
0
Tables
-
Executive Summary
-
Introduction
-
Research Findings
-
Containers play a leading role in a heterogenous stack deployed across distribut…
-
Program maturity gaps result in inconsistency, misconfigurations, and visibility…
-
A diverse threat model is driving the need for an integrated defense-in-depth…
-
The shift from a bottom-up to a top-down approach is increasing the role of IT…
-
The processes of cloud-native security: automation via SDLC integration spans…
-
The requirement for breadth of coverage and depth of functionality is leading…
-
Conclusion
-
Research Methodology
-
Respondent Demographics
|
ESG Research Report: The Maturation of Cloud-native Security
ESG Research Report
May 07, 2021
The composition of cloud-native applications is a mix of APIs, containers, VMs, and serverless functions continuously integrated and delivered. Securing these applications, the underlying infrastructure, and the automation platforms that orchestrate their deployment necessitates revisiting threat models, gaining organizational alignment, and leveraging purposeful controls. Additionally, as security and DevOps continue to converge, cloud security controls are being consolidated. Project teams are evolving from a siloed approach to a unified strategy to securing cloud-native applications and platforms. In parallel, vendors are consolidating cloud security posture management (CSPM), cloud workload protection (CWP), container security, and more into integrated cloud security suites, impacting buyer personas and vendor sales motions.
In order to gain insight into these trends, ESG surveyed 383 IT and cybersecurity professionals at organizations in North America (US and Canada) personally responsible for evaluating or purchasing cloud security technology products and services.
Page Count: 27
Table of Contents
-
Executive Summary
-
Introduction
-
Research Findings
-
Containers play a leading role in a heterogenous stack deployed across distributed cloud environments.
-
Program maturity gaps result in inconsistency, misconfigurations, and visibility gaps.
-
A diverse threat model is driving the need for an integrated defense-in-depth strategy.
-
The shift from a bottom-up to a top-down approach is increasing the role of IT ops.
-
The processes of cloud-native security: automation via SDLC integration spans the application lifecycle.
-
The requirement for breadth of coverage and depth of functionality is leading the consolidation of point tools into integrated platform modules.
-
Conclusion
-
Research Methodology
-
Respondent Demographics
|
Other Users Also Viewed
Nov 29, 2022
In order to assess technology spending priorities over the next 12-18 months, ESG recently surveyed 742 senior IT decision makers representing midmarket (100 to 999 employees) and enterprise-class (1,000 employees or more) organizations in North Amer…
|