top of page

Analyst Coverage of Cybersecurity Categories

  • brencronin
  • Aug 24
  • 3 min read


Category

Gartner (Magic Quadrant / Critical Capabilities)

Forrester (Wave Reports)

Identity & Access Management (IAM)

✅ Identity Governance & Administration (IGA)


✅ Access Management (AM)


✅ Privileged Access Management (PAM)


✅ External Attack Surface Management (sometimes in IAM scope)

✅ Identity-as-a-Service (IDaaS)


✅ Privileged Identity Management (PIM)


✅ Customer Identity & Access Management (CIAM)

Endpoint & Device Security

✅ Endpoint Protection Platforms (EPP)


✅ Endpoint Detection & Response (EDR)


✅ Extended Detection & Response (XDR)


✅ Unified Endpoint Management (UEM)

✅ Endpoint Security Suites


✅ Endpoint Detection & Response (EDR)


✅ Extended Detection & Response (XDR)

Network Security

✅ Network Firewalls (NGFW)


✅ Intrusion Detection/Prevention (IDS/IPS, often folded into NGFW)


✅ Network Access Control (NAC)


✅ DDoS Mitigation

✅ Zero Trust eXtended (ZTX) ecosystem reports cover NAC, NGFW, and ZTNA


✅ Zero Trust Network Access (ZTNA)

Cloud Security

✅ Cloud Access Security Brokers (CASB)


✅ Cloud Security Posture Management (CSPM)


✅ Cloud Workload Protection Platforms (CWPP)


✅ SaaS Security Posture Management (SSPM)


✅ Cloud Infrastructure Entitlement Management (CIEM)


✅ Security Service Edge (SSE) / Secure Access Service Edge (SASE)

✅ Cloud Workload Security (CWS)


✅ Cloud Security Gateways (CASB/SSE)


✅ Cloud Native Security Platforms (CNSP)

Application Security

✅ Application Security Testing (SAST, DAST, IAST combined MQ)


✅ Web Application Firewalls (WAF)


✅ API Protection (new markets forming)


✅ Software Composition Analysis (SCA)

✅ Application Security Testing (SAST/DAST/IAST)


✅ API Security


✅ Web Application Firewalls (WAF)

Email & Collaboration Security

✅ Email Security (Cloud & On-Prem)


✅ Messaging Security

✅ Enterprise Email Security Providers

Threat Intelligence & Hunting

✅ Threat Intelligence Platforms (TIP)


✅ Breach & Attack Simulation (BAS)


✅ Deception Technology

✅ External Threat Intelligence Services


✅ Breach & Attack Simulation Platforms


✅ Threat Intelligence Platforms

Security Operations (SOC) & Analytics

✅ Security Information & Event Management (SIEM)


✅ Security Orchestration, Automation, and Response (SOAR)


✅ UEBA (folded into SIEM/XDR)


✅ Managed Detection & Response (MDR)


✅ Network Detection & Response (NDR)

✅ Security Analytics Platforms (SIEM/UEBA)


✅ Managed Detection & Response (MDR)


✅ SOAR Platforms

Vulnerability & Risk Management

✅ Vulnerability Assessment (VA)


✅ Attack Surface Management (ASM)


✅ Cyber Asset Attack Surface Management (CAASM)


✅ External Attack Surface Management (EASM)

✅ Vulnerability Risk Management


✅ Cyber Risk Ratings Platforms


✅ External Attack Surface Management

Data Security

✅ Data Loss Prevention (DLP)


✅ Data Security Posture Management (DSPM)


✅ Database Activity Monitoring (DAM)


✅ Encryption & Key Management

✅ Data Security Platforms


✅ Enterprise DLP

Zero Trust Security

✅ Zero Trust Network Access (ZTNA)


✅ Secure Access Service Edge (SASE)


✅ Security Service Edge (SSE)


✅ Continuous Adaptive Risk/Trust (emerging)

✅ Zero Trust eXtended (ZTX) reports across identity, network, data, and workloads

OT & IoT Security

✅ OT Security (ICS/SCADA Security)


✅ IoT Security

✅ OT Security (often within broader Zero Trust or IoT coverage)


✅ Device Security Reports

Governance, Risk & Compliance (GRC)

✅ IT Risk Management


✅ Integrated Risk Management (IRM)


✅ Vendor Risk Management

✅ GRC Platforms


✅ Third-Party Risk Management (TPRM)

Backup, Recovery & Resilience

✅ Data Center Backup & Recovery Solutions


✅ Disaster Recovery as a Service (DRaaS)

✅ Data Resilience Solutions


✅ Backup & Recovery

Security Awareness & Training

✅ Security Awareness CBT Providers

✅ Security Awareness & Training Solutions


✅ Cybersecurity Skills & Training Platforms

Privacy & Data Governance

✅ Data Privacy Management Tools


✅ Consent & Preference Management

✅ Privacy Management Software Platforms

Emerging Areas

✅ Confidential Computing


✅ Quantum-Safe Encryption


✅ AI/ML Security

✅ AI for Cybersecurity Platforms


✅ Cybersecurity Skills Gaps & Emerging Vendors


 
 
 

Comments


Post: Blog2_Post
  • Facebook
  • Twitter
  • LinkedIn

©2021 by croninity. Proudly created with Wix.com

bottom of page