Cyber Tech Radar 2022 Brochure PDF en v5 WEB
Cyber Tech Radar 2022 Brochure PDF en v5 WEB
Tech Radar
Tracking innovations for efficient,
agile and smart security
2022 edition
Foreword beyond. Cognitive AI (CAI) and frugal AI are a few examples of
emerging trends that will shape the evolution of cybersecurity.
For each cybersecurity domain, we have grouped the cybersecurity
technological trends in terms of speed of adoption:
• Zero to two years: Mature technologies are either already
Consequently, in order to help organizations keep an eye on adopted by most organizations or will be in the next two
the latest cybersecurity tech trends and identify the security years In other words, these technologies have become an
technologies that can help them address cyberthreats integral part of the security strategies of most companies.
efficiently, we created the Atos Cybersecurity Tech Radar. • Two to five years: Proven technologies are usually adopted in the
next two to five years cycle as organizations improve in maturity.
Zeina Zakhour With this yearly updated radar, organizations can keep • Five years and above: emerging trends will be adopted by
Global Chief Technical Officer, abreast of the emerging cybersecurity innovations, and adopt the mainstream after approximatively five years or more.
Digital Security, Atos an agile cybersecurity strategy that can adapt to the changing Still, organizations with a mature cybersecurity level can
digital environments. adopt such emerging trends earlier.
The only constant in our cybersecurity industry is change, Our Atos security experts are tracking more than 150 For each technology trend captured in our radar, we have worked on:
leaving organizations with a myriad of emerging cybersecurity cybersecurity technological trends that are shaping and • The main business use cases it addresses.
technological trends that can secure their digital transformational transforming the industry as we speak. We built our radar • The benefits it brings with a focus, when applicable, on the
journey and thwart looming cyberthreats. However, innovation around eight major cybersecurity domains, because we specific market verticals.
in cybersecurity is not only focused on improving the security believe those are the most critical for the end-to-end • The main challenges to adoption that organizations must
of the digital environments, but also to provide an agile management of your security posture and security of your take into consideration when deploying any of those
architectural blueprint adapted to the increasingly distributed, digital transformation. cybersecurity technology trends.
decentralized and complex organizational environment.
• Advanced Detection & Response Cybersecurity innovation is a key contributor to the success of
Those challenges are heightened by the cybercriminals’ speed • Cyber Incident Response the digital revolution as we know it today. Undoubtedly, it will
of innovation. Cybercriminals and state-sponsored actors keep • Identity & Access Management continue to be a key foundation for safe and secure adoption
innovating at a fast rate, leveraging new technologies to steal • Endpoint and Mobile Security of future technology trends such as quantum, edge and
data, commit fraud and extort money. Now, not only do they try • Network Security swarm computing, ethical AI and immersive experience.
to paralyze critical national infrastructures, but also local and • Application Security
regional authorities, which realize they have become a target. • Cloud Security Our Cyber Tech Radar aims to help you navigate the breadth
Nobody is exempt from being attacked. • Data Security of cybersecurity technologies and support you in refining the
cybersecurity strategy of your organization. To stay informed
Concepts like the cybersecurity mesh are presenting a modern Let us take a few figures about the latest cybersecurity news and updates to the radar,
74% 79%
conceptual approach to security architecture. Emerging trends such follow: https://www.linkedin.com/showcase/atos-digital-security/
70% 75%
ofofcompanies
organizations of organizations
credential
as the metaverse change the creation, use and consumption of experienced
with public cloud
a suffered
abuse attacks
an
digital services, and raise new concerns and challenges in terms of security
capabilities
incident in identity-related
against financial Contributors
2021. (Security Leaders
experienced
Research a breach in the last
services
two years.
directly
security. When identity is the new perimeter and data the new oil, Aleksander Pawlicki, Allen Moffett, Amalia Lin, Ana Bura, Andrei Chipaila,
securityVectra)
Report, incident last year. (the targeted
(IdentityAPIs
Defined
or also.
Secury Alliance)
solutions such as Privacy Enhancing Cryptography (PEC), applied to State of Cloud Security, 2020). (Information Age). Andrei Dumbrava, Angel Polamaro, Boubacar Camara, Christian Radu
concrete use cases protect data in use. Cleiton Lenkiu, Dan Schaupner, Dragos Pelian-Popa, Ernesto Parodi, Farah
53%
64% 94%
61%
of web-targeted of organizations
increase
attacks in
in the of
haveall SMBs
had an Rigal, Gabriel Priceputu, Gabriela Gorzycka, Geert Fieremans, Ivana Getia,
costs of half
the first have reported
identity-related
To top it all, artificial intelligence is infused to all cybersecurity Laurence Begou, Lia Predut, Marc Llanes, Marcin Krysinski, Marco Gruber,
cybercrimes,
of 2020 used at least one cyber-attack during
breach, which 99%
areas. Deep learning and machine learning are already in use, whereas those cybercrimes only the previous year. (Verizon) Marcus Lahm, Mihai Belu, Mircea Avram, Mohan Ayare, Nitin Kulkarni,
APIrequests. (Forbes). believe could have been prevented.
but AI use cases and usability in the cybersecurity field goes grew by 7% in volume (Identity Defined Security Alliance). Philippe Bodden, Raul Salagean, Reli Arras, Thierry Winter, Vali Pop, Vasco
(Internet Crime Report 2021, FBI)
Gomes, Vinod Vasudevan, Wojciech Bohatyrewicz, Zeina Zakhour.
The Cybersecurity
tools
File AI driven threat
Ethical
Analysis modeling
Machines
Homomorphic
Tech Radar
Autonomous Encryption Swarm security intelligence
DataSecOps Privacy Impact
Assessment
Quantum Safe intelligence
Key Distribution Cognitive detection &
sharing
Secure Multi-Party Lightweight response
Blockchain
Computation encryption security monitoring
Security for AI
Cloud
Testing tools
Security
rating services
Unified fraud
& Security VR/AR Security
Tracking innovations for efficient,
agile and smart security
Awareness Training
Cybersecurity DRPS/EASM
Quantum-Safe Mesh Architecture
encryption Anonymization Attribute-based AI-powered
Encryption AI driven XDR Cyber Range
tools Security
SOAR Data Cyber deception
Consent Data Secure Access Annotation Cyber Crisis Dynamic
Management Service Edge 5G monitoring & Table Top Exercise Risk-based Security
Mapping
Crypto Integrated response
-
& BYOE IT/IoT/IoMT
KMaaS Digital Augmented Reality
Data-centric Audit Cyber API Security
signature Threat Modeling
Fraud Threat monitoring
& Protection Breach and Attack
Database Detection Intelligence MDR Targeted Security
Data Discovery Encryption Simulation
Chaos Hybrid & Multi-cloud unified Awareness
engineering & classification
Cloud Security Enterprise Privacy detection & response Cyber Deception
Encryption Service Edge digital rights by design Risk-based vulnerability Threat
Vulnerability
management Hunting
Sovereign Cloud management Research
Easy Data
DevSecOps Cryptographic
SECaaS Loss MITRE based risk MITRE ATT&CK Threat & Vulnerability
Security for agility management Mapping Management Autonomous &
Prevention
Serverless Cloud Integrated
Time Edge
CNAPP Digital Threat hunting
Zero Trust stamping security
Cyber Threat Surveillance DRPS/EASM
Network Access Dynamic analytics
OpenID Connect Intelligence
Cloud Workload Data Masking
Threat Intelligence
Confidential Protection Platform Platform
Cloud Application Vulnerability Dynamic
Computing Assessment
Security Testing Container and CSP Native Trusted Third provisioning
Kubernetes Security Security Adaptive party Access Adaptive ID &
Immutable API Threat CIAM Access control Access Governance Continuous
CASB WAF Converged
Infrastructure Protection IaaS Container identity
Authentication &
Encryption Data Security authorization)
Protected
Cloud security Access IDoT (IAM for IoT)
Browser NgFW Governance
Continuous Posture Management
Zero password
Application Security DNS Data
Privacy Application 0 authentication
Testing Security Loss to API Access control
Compliance Gateway UMA (User-
Prevention 2y
Low Code/ Zero Trust ea Saas Managed Access)
NetworkAccess rs
no Code Data-centri IAM Decentralized Identity /
security Audit & protection Zero Trust Self-soveriegn identity
Secure Mail
Gateway Network Network Access
Crowdsource Dynamic Software Access Prescriptive IAM
security testing AST composite Control EDR
platforms In-app Analysis TLS decryption BYOD
protection Platform 2 IAMaaS (Full
DDoS to Service IDaaS)
Mitigation Unified 5
WAF Malware Endpoint ye
Secure Web ar Generative Identity
Runtime Protection Management s
Static Microsegmentation Gateway
Application Secure
Self-Protection AST Service Edge
5G security Mobile Threat
Application Defense
Network Security IoT edge 5+
DevSecOps Shielding ye
Interactive Active Directory Policy Management behaviour
NextGen ar
Application Security analysis s
Security Testing Browser AntiVirus
Microsegmentation
Isolation
Network flow DLP
Analyzer Secure Access
for Mobile
Contextual Secure Instant Service Edge IoT SDP
security Communication Hardware
Business Email based Security
Compromise
Mitigation IoT devices
Network Traffic Security
Analyzer
HPC Security
Cyber Physical
by design
System
AI-driven Threat
end goal of staying in front of the
5+
Modeling
Safe Intelligence
s
Key Figures
ear
Sharing
5y
Blockchain
Security Monitoring
2 to
Risk-based Vulnerability
next two years. over five years.
0 to
MDR Management
MITRE-based Risk
Management
Edge
Security
Analytics
VR/AR Security environments before they are impact or even lead to improper
yea
Awareness Training
exploited by threat actors. security response. Thus, risks
5+
AI-powered
Cyber Range Dynamic With them, organizations will get must be identified first, by
Risk-based Security
better insight on the weaknesses leveraging the SOC detection,
Augmented Reality
Threat Modeling
in their environments and will be threat intelligence sharing and
able to proactively mitigate them. cyber deception tools.
rsea
Vulnerability
Research
DRPS/EASM
MITRE ATT&CK
Mapping
Threat
rsea
Platform
Intelligence
of those technologies are of those technologies are of those technologies are
0 to
Digital
Surveillance either already adopted by most expected to be adopted in the transformational and
Vulnerability
organizations or will be in the next two to five-year cycle. widespread adoption will take
Assessment
next two years. over five years.
Continuous
Authentication & technologies, leading to better ROI.
5+
Authorization)
UMA (User-
Managed Access)
Key Figures
s
Dynamic
ear
Adaptive ID &
Access Governance
Generative Identity
IAMaaS (Full IDoT (IAM for IoT)
Service IDaaS)
Data Decentralized Identity / of those technologies are of those technologies are of those technologies are
Access Self-Sovereign Identity
Governance
either already adopted by most expected to be adopted in the transformational and
Trusted Third API Access Control organizations or will be in the next two to five-year cycle. widespread adoption will take
Party Access
next two years. over five years.
s
ear
Converged
Zero Password
2y
Identity
Authentication
Security
0 to
Adaptive
Access Control
SaaS IAM
CIAM
Access, new Unified Endpoint need, such as DLP technologies, malware protection technologies
yea
IoT SDP
BYOD solutions. digital rights management and techniques
IoT Devices application shielding.
Security
Unified
Endpoint
rs
Management
ea
5y
Application
IoT Edge HPC Security
Key Figures
2 to
Behaviour by Design
Shielding Analysis
Data
Loss
Prevention
Hardware
Based Security
NextGen
AntiVirus 31% 50% 19%
DLP
Zero Trust for Mobile of those technologies are of those technologies are of those technologies are
rs
Network Access either already adopted by most expected to be adopted in the transformational and
ea
2y
organizations or will be in the next two to five-year cycle. widespread adoption will take
0 to
BYOD EDR
next two years. over five years.
Malware
Protection
Network Traffic
Analyzer
5G Security
rsea
Cyber Physical
Active Directory
Key Figures
5y
System
Security
2 to
Secure Access
Service Edge
Access
TLS Decryption Control organizations or will be in the next two to five-year cycle. widespread adoption will take
2y
Platform
Secure Web
next two years. over five years.
0 to
Gateway
Zero Trust
Network Access
DNS WAF
Security
NgFW
Secure Access Service Edge (SASE) combines the functionality of an SD-WAN with network
security technologies like firewall, secure web gateways, cloud access security broker (CASB)
and network access identity.
Crowdsource
just a few of the fast adopted new
5+
Security Testing
Platforms
tech trends in application security.
Runtime
Application
Self-Protection
s
Low Code/
ear
No Code
Interactive
5y
Security
Application
2 to
Security Testing
In-app
Dynamic
AST Key Figures
Protection Contextual
Security
Software
Protected
either already adopted by most expected to be adopted in the transformational and
2y
Composite
Browser Analysis
0 to
Application Security
organizations or will be in the next two to five-year cycle. widespread adoption will take
Testing next two years. over five years.
WAF
Why it matters
• As cloud adoption and multi-cloud deployments spread Losing track of cloud The growth Awareness is rising Customers need to
exponentially, organizations are faced with unmanaged services and cloud of shadow IT classify and determine
security risks and data exposure. native applications due to more frequent the accountability for
• Organizations will need solutions for a single pane of glass is a security vulnerability occurrence of data their data
security operation in their cloud and hybrid environment. Some employees inside which may lead breaches and the legal
• Compliance with data privacy regulations and other legal the organization may to data leakage or consequences thereof, as visibility of the data
rules will also require better cloud security testing and not conform to the data breaches. The leading to monitoring classification allows
continuous compliance monitoring/control. organization’s security result? loss of trust and closer management appropriate security
requirements. of customers, legal of cloud applications measures to be applied.
complications, and even and growing attention to
Chaos
loss of quality in the cloud legal compliance,
rs
an employee run-off.
5+
Sovereign Cloud
CNAPP
Confidential
Cloud Computing
s
ear
Encryption
Immutable
Key Figures
5y
Infrastructure
DevSecOps
2 to
Zero Trust
Cloud Application
Security Testing
Cloud security
API Threat
Protection
31.5% 37% 31.5%
Network Access Posture Management
of those technologies are of those technologies are of those technologies are
Container and
Kubernetes Security either already adopted by most expected to be adopted in the transformational and
s
ear
IaaS Container
organizations or will be in the next two to five-year cycle. widespread adoption will take
2y
Encryption
Cloud Workload next two years. over five years.
0 to
Protection Platform
CSP Native
Security
CASB
Cloud native application protection platforms (CNAPPs) are an integrated set of security and compliance capabilities designed
to help secure and protect these cloud-native applications from development to production runtime.
CNAPPs consolidate many previously siloed capabilities such as network micro/nano segmentation, container scanning,
Infrastructure as Code (IaC) scanning, Cloud Infrastructure Entitlement Management (CIEM), Cloud Security Posture
Management (CSPM) and Cloud Workload Protection Platforms (CWPPs)
Personification
Tools
5+
Homomorphic
Encryption
Key Figures
Ethical
Machines
File Analysis
Autonomous
Privacy Impact
s
Assessment Tool
ear
Data-centric Audit
DataSecOps
5y
& Protection
Quantum
Key Distribution
Data
Data Discovery Mapping
& Classification
Secure Multi-Party
Computation
KMaaS Anonymization
Digital Tools
Signature Security for AI
Database
Crypto
& BYOE Secure Access
Service Edge Cloud
of those technologies are of those technologies are of those technologies are
Encryption Testing Tools
either already adopted by most expected to be adopted in the transformational and
rs
Fraud Quantum-Safe
ea
Encryption
Enterprise Detection
2y
Data
Security Consent
Loss Attribute-based
Service Edge Management
Easy
Cryptographic
Prevention
Encryption
next two years. over five years.
Agility Dynamic
SECaaS
Data Masking
Privacy
Time by Design
Stamping
• Use cases of quantum-safe Replacing standard cryptographic • Although several QSC ciphers already Virtually any industry that relies on
methods with quantum-safe methods exist, the standardization process is still standard cryptographic methods will be
cryptography revolve mainly
will mitigate the future threat posed by underway with NIST. vulnerable once full-fledged quantum
around replacing current standard
quantum computers and provide an computers are available. The adoption
cryptographic protocols with new • Moreover, extensive crypto analysis will will come first in the telecom vertical,
quantum-safe ones that are still in a opportunity to enhance communication
be required before QSC ciphers reach a then move outwards to other sensitive
standardization process. Depending on and encryption security.
significant level of maturity. industries, such as:
use cases, plug-in replacement can be
• From a performance perspective,
required for some protocols in complex • Governments and defense institutions
increase in key length and in signature
cryptographic systems. • Banking and finance
volumes can represent a serious
• Healthcare
• Similarly, the point at which current obstacle, particularly for drop-in
cryptographic protocols must be replacements in complex protocols like
replaced depends on the potential TLS.
short- or middle-term impact of future
quantum computers on stored data.
CT-221019-AR-BR-Cybersecurity-Tech-Radar-en v3