Analyst Coverage of Cybersecurity Categories
- brencronin
- Aug 24
- 3 min read
Category | Gartner (Magic Quadrant / Critical Capabilities) | Forrester (Wave Reports) |
Identity & Access Management (IAM) | ✅ Identity Governance & Administration (IGA) ✅ Access Management (AM) ✅ Privileged Access Management (PAM) ✅ External Attack Surface Management (sometimes in IAM scope) | ✅ Identity-as-a-Service (IDaaS) ✅ Privileged Identity Management (PIM) ✅ Customer Identity & Access Management (CIAM) |
Endpoint & Device Security | ✅ Endpoint Protection Platforms (EPP) ✅ Endpoint Detection & Response (EDR) ✅ Extended Detection & Response (XDR) ✅ Unified Endpoint Management (UEM) | ✅ Endpoint Security Suites ✅ Endpoint Detection & Response (EDR) ✅ Extended Detection & Response (XDR) |
Network Security | ✅ Network Firewalls (NGFW) ✅ Intrusion Detection/Prevention (IDS/IPS, often folded into NGFW) ✅ Network Access Control (NAC) ✅ DDoS Mitigation | ✅ Zero Trust eXtended (ZTX) ecosystem reports cover NAC, NGFW, and ZTNA ✅ Zero Trust Network Access (ZTNA) |
Cloud Security | ✅ Cloud Access Security Brokers (CASB) ✅ Cloud Security Posture Management (CSPM) ✅ Cloud Workload Protection Platforms (CWPP) ✅ SaaS Security Posture Management (SSPM) ✅ Cloud Infrastructure Entitlement Management (CIEM) ✅ Security Service Edge (SSE) / Secure Access Service Edge (SASE) | ✅ Cloud Workload Security (CWS) ✅ Cloud Security Gateways (CASB/SSE) ✅ Cloud Native Security Platforms (CNSP) |
Application Security | ✅ Application Security Testing (SAST, DAST, IAST combined MQ) ✅ Web Application Firewalls (WAF) ✅ API Protection (new markets forming) ✅ Software Composition Analysis (SCA) | ✅ Application Security Testing (SAST/DAST/IAST) ✅ API Security ✅ Web Application Firewalls (WAF) |
Email & Collaboration Security | ✅ Email Security (Cloud & On-Prem) ✅ Messaging Security | ✅ Enterprise Email Security Providers |
Threat Intelligence & Hunting | ✅ Threat Intelligence Platforms (TIP) ✅ Breach & Attack Simulation (BAS) ✅ Deception Technology | ✅ External Threat Intelligence Services ✅ Breach & Attack Simulation Platforms ✅ Threat Intelligence Platforms |
Security Operations (SOC) & Analytics | ✅ Security Information & Event Management (SIEM) ✅ Security Orchestration, Automation, and Response (SOAR) ✅ UEBA (folded into SIEM/XDR) ✅ Managed Detection & Response (MDR) ✅ Network Detection & Response (NDR) | ✅ Security Analytics Platforms (SIEM/UEBA) ✅ Managed Detection & Response (MDR) ✅ SOAR Platforms |
Vulnerability & Risk Management | ✅ Vulnerability Assessment (VA) ✅ Attack Surface Management (ASM) ✅ Cyber Asset Attack Surface Management (CAASM) ✅ External Attack Surface Management (EASM) | ✅ Vulnerability Risk Management ✅ Cyber Risk Ratings Platforms ✅ External Attack Surface Management |
Data Security | ✅ Data Loss Prevention (DLP) ✅ Data Security Posture Management (DSPM) ✅ Database Activity Monitoring (DAM) ✅ Encryption & Key Management | ✅ Data Security Platforms ✅ Enterprise DLP |
Zero Trust Security | ✅ Zero Trust Network Access (ZTNA) ✅ Secure Access Service Edge (SASE) ✅ Security Service Edge (SSE) ✅ Continuous Adaptive Risk/Trust (emerging) | ✅ Zero Trust eXtended (ZTX) reports across identity, network, data, and workloads |
OT & IoT Security | ✅ IoT Security | ✅ OT Security (often within broader Zero Trust or IoT coverage) ✅ Device Security Reports |
Governance, Risk & Compliance (GRC) | ✅ IT Risk Management ✅ Integrated Risk Management (IRM) ✅ Vendor Risk Management | ✅ GRC Platforms ✅ Third-Party Risk Management (TPRM) |
Backup, Recovery & Resilience | ✅ Data Center Backup & Recovery Solutions ✅ Disaster Recovery as a Service (DRaaS) | ✅ Data Resilience Solutions ✅ Backup & Recovery |
Security Awareness & Training | ✅ Security Awareness CBT Providers | ✅ Security Awareness & Training Solutions ✅ Cybersecurity Skills & Training Platforms |
Privacy & Data Governance | ✅ Data Privacy Management Tools ✅ Consent & Preference Management | ✅ Privacy Management Software Platforms |
Emerging Areas | ✅ Confidential Computing ✅ Quantum-Safe Encryption ✅ AI/ML Security | ✅ AI for Cybersecurity Platforms ✅ Cybersecurity Skills Gaps & Emerging Vendors |



Comments