Multi-vendor Survey Report Schedule
About This Report:
Survey of 500 IT security professionals from countries in North America, Europe, and Asia Pacific about their reliance on cloud security tools that defend against sophisticated threats and/or embrace cloud infrastructure for efficient delivery of modern cybersecurity defenses. This report will delve into the minds of cloud security practitioners to understand which threats concern them most, cloud security technologies they plan to acquire in the coming year, and best practices they currently embrace to mitigate cloud-based cybersecurity risks.
Vendor Fit:
All cloud security vendors, including those that offer secure access service edge (SASE), cloud-native application protection platform (CNAPP), cloud security posture management (CSPM), cloud infrastructure entitlement management (CIEM), cloud workload protection platform (CWPP), cloud detection and response (CDR), cloud-based network security tools (e.g., NGFW, IPS, WAF, SWG, SEG, DLP), and other cloud security solutions.
About This Report:
Survey of 500 IT security professionals from countries in North America, Europe, and Asia Pacific about their reliance on security operations tools that enable security teams to work more efficiently and effectively. This report will delve into the minds of security operations professionals to understand the challenges they face, the security operations tools they use to overcome them, and best practices they currently embrace to mitigate today’s cybersecurity risks.
Vendor Fit:
All security operations vendors, including those that offer security information and event management (SIEM), vulnerability management (VM), security configuration management (SCM), patch management, penetration testing, threat intelligence platform (TIP), security orchestration and response (SOAR), user and entity behavior analytics (UEBA), advanced security analytics, cyber risk quantification / scorecards, and other security operations solutions.
About This Report:
Survey of 500 IT security professionals from countries in North America, Europe, and Asia Pacific about their reliance on managed security service providers (MSSPs) to perform critical information security functions, such as cyberthreat hunting, monitoring and managing security infrastructure (e.g., SIEM, NGFW, IPS, WAF, SWG, SEG), DDoS prevention, vulnerability management, and other everyday information security tasks.
Vendor Fit:
All security vendors that provide managed security services (MSS), including managed security service provider (MSSP), managed detection and response (MDR), managed extended detection and response (MXDR), and more.
About This Report:
CyberEdge’s flagship Cyberthreat Defense Report (CDR) has rapidly become the de facto standard for assessing organizations’ security posture, for gauging perceptions of cybersecurity professionals, and for ascertaining current and planned cybersecurity investments. Each year for more than a decade, CyberEdge surveys 1,200 IT security professionals from 17 countries and 19 industries. The CDR is by far the most comprehensive, geographically diverse, vendor-agnostic research report in the IT security industry. CyberEdge’s Silver, Gold, and Platinum sponsors make this annual report possible.
Vendor Fit:
All IT security software vendors and service providers that offer solutions for detecting cyberthreats and mitigating cybersecurity risks.
About This Report:
Survey of 500 IT security professionals from countries in North America, Europe, and Asia Pacific about their reliance on identity security tools to mitigate the risk of identity-based threats and safeguard company applications and data. This report will delve into the minds of security practitioners to understand which identity-based threats concern them most, which identity security technologies they plan to acquire in the months ahead, and best practices they currently embrace to mitigate identity- based cybersecurity risks.
Vendor Fit:
All security vendors that offer identity security solutions, including identity and access management (IAM), multi-factor authentication (MFA), passwordless authentication, single sign-on (SSO), privileged access management (PAM), user and entity behavior analytics (UEBA), identity governance and administration (IGA), biometric authentication systems, and other identity security solutions.
About This Report:
Survey of 500 IT security professionals from countries in North America, Europe, and Asia Pacific about their reliance on zero trust security solutions to defend against today’s most sophisticated threats. This report will delve into the minds of security practitioners to understand which threats concern them most, zero trust security technologies they plan to acquire in the months ahead, and zero trust best practices they currently embrace to mitigate cybersecurity risks.
Vendor Fit:
All security vendors who offer software, hardware, and/or services pertaining to zero trust security frameworks, including those that offer identity and access management (IAM), multi-factor authentication (MFA), microsegmentation, privileged access management (PAM), endpoint security solutions, network access control (NAC), encryption, and other related security technologies.
About This Report:
Survey of 500 IT security professionals from countries in North America, Europe, and Asia Pacific about their reliance on cloud security tools that defend against sophisticated threats and/or embrace cloud infrastructure for efficient delivery of modern cybersecurity defenses. This report will delve into the minds of cloud security practitioners to understand which threats concern them most, cloud security technologies they plan to acquire in the coming year, and best practices they currently embrace to mitigate cloud-based cybersecurity risks.
Vendor Fit:
All cloud security vendors, including those that offer secure access service edge (SASE), cloud-native application protection platform (CNAPP), cloud security posture management (CSPM), cloud infrastructure entitlement management (CIEM), cloud workload protection platform (CWPP), cloud detection and response (CDR), cloud-based network security tools (e.g., NGFW, IPS, WAF, SWG, SEG, DLP), and other cloud security solutions.
Scheduled Upon Request
202X State of Advanced Threat Defenses
202X State of Cyber Risk Quantification
202X State of Digital and Network Forensics
202X State of Email Security
202X State of Extended Detection and Response (XDR)
202X State of ICS/OT Security
202X State of Identity Security
202X State of Ransomware Defenses
202X State of Remote Workforce Security
202X State of Third-party Risk Management (TPRM)
202X State of Threat Intelligence Services
202X State of Zero Trust Security