Cybersecurity Providers Must Approach 2023 with Product Simplicity and Consolidation in Mind

R. Muru

Summary Bullets:

• Vendors with wider portfolio and high growth product suites should focus on enterprise portfolio consolidation, with strong supporting business case.

• Vendors must factor in their revenue projections longer sales cycles and project delays on more complex cybersecurity deals in 2023.

Enterprise Trends:
As 2023 progresses, enterprises continue to face tough economic conditions. This year has already witnessed mass layoffs in technology and other sectors as organizations look to cut costs and streamline operations ahead of what is expected to be major reductions in consumer and corporate spending. IT budgets are expected to suffer as planned projects get shelved and executives reassess priorities.

However, GlobalData predicts that cybersecurity will remain a top investment priority in the new year. The fallout from recent attacks has been costly. Cybercrime instruments like ransomware have profound psychological and financial consequences, which keep cybersecurity top of mind for both IT professionals and corporate executives. Additionally, the move to hybrid work operations presents cybercriminals with an opportunity they were quick to explore. Though there has been considerable work done in areas such as endpoint detection and response to close some security gaps, hackers are still finding ways to navigate around protections.

Organizations have expected to maintain current levels of enterprise investment in cybersecurity. However, sales cycles will be longer for more larger, complex deals, and some projects will be delayed.

Top 5 GlobalData Enterprise Cybersecurity Themes Vendors Should Take into Consideration
GlobalData expects end user organizations to build on existing investments in the coming year but also to further explore key cybersecurity developments in 2023, presented below:

1. Simplicity in Cybersecurity and Better Risk Management: Vendors will continue to innovate in 2023, spanning across applications, cloud to legacy environments, and to the point of end user devices, whatever and wherever that might be. However, there will be greater involvement by enterprise executive teams in communicating how security measures translate into positive business outcomes, positive revenue, and limit overall enterprise risks across the complete supply chain. And this should be the foundation for vendors when engaging with end user organizations.

2. Automation, Analytics, and AI Get Ready for Prime Time: There must be tighter integration across threat intelligence functions including analytics and AI to improve the effectiveness of solutions. More managed security providers are looking to ingest data from multiple feeds to react more quickly to real threats. 2023 may also be the year that more organizations find the appetite for applying automation to incidence response increasing.

3. Unified and Integrated Detection/Response and Technology Consolidation: The ‘unified and integrated detection/response’ market will gain further momentum in 2023 as technologies further mature that offer integrated detection and response across network, endpoint, and cloud. The focus here for enterprises and vendors should be on unifying prevention, detection, investigation, and response with behavioral analytics utilizing AI.

4. Converged Network and Cloud Security with Zero Trust: More organizations will continue to map out what can be multi-year strategies to deploy solutions that support secure access service edge (SASE) and zero trust architectures. GlobalData expects more movement forward as enterprises deploy solutions like cloud access security broker as well as implement SASE and zero trust to better protect their IT estates end-to-end.

5. DevSecOps on the Ascent: GlobalData predicts 2023 will be the year that DevSecOps efforts really get off the ground. While enterprises will still need to navigate the challenges of limited resources and budget constraints, GlobalData expects to see real progress in areas such as cross-training of security analysts in cloud technology management and investment in tools to incorporate security controls in the earliest phases of development.

What do you think?

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.