Cybersecurity Report 2023 03
Cybersecurity Report 2023 03
GENERATION OF
CYBERSECURITY
APPLICATIONS
How AI, ML, search and analytical applications are developed
and deployed to transform enterprise cybersecurity.
TABLE OF
CONTENTS
A Data-Backed Report................................................................................................................................. 3
Modern Security Solutions for the Evolving Threat Landscape........................................................ 4
Three Cybersecurity Market Trends......................................................................................................... 7
2
A DATA-BACKED REPORT
The cybersecurity landscape is always changing with the Using aggregated usage data (See Appendix: Detailed Methodology),
increasing volume, variety and velocity of data. To help this report identifies cybersecurity providers currently using Snowflake
security teams stay ahead of adversaries, cybersecurity to power their applications who are leaders and ones to watch
providers need to effectively turn large datasets into across five categories that are leading in adoption among enterprise
actionable insights, quickly deliver features to streamline security teams.
and automate security operations, and confidently ensure
The five categories evaluated — security information and event
high software reliability and scalability. management (SIEM), cloud security, compliance, emerging segments
Cybersecurity solutions that maintain customer data in (e.g. email security) and data enrichment — are ripe for transformation.
distinct silos, away from the rest of the organization’s data, Security teams require more effective detection and response
capabilities, more holistic workload protection as more organizations
present a myriad of challenges. There is an urgency for
migrate to the cloud, and increased automation for audits. The
cybersecurity providers to build solutions that connect to
cybersecurity providers highlighted in this report are offering security
the security team’s security data lake strategy.
capabilities to their customers, allowing those customers to achieve
better data outcomes.
** See
See Appendix: DetailedMethodology
Appendix: Detailed Methodologyfor
foradditional
additionaldetails
details
onon selection
selecti on andand categorization
categoriza of referenced
t i on of the the referenced technologies.
technologies.
2 Cybersecurity providers are Instead of spinning up a new tech stack to run AI and machine learning workloads, data scientists
building new, more secure and app developers are joining their data teams in building these features on a single data
AI and ML capabilities into platform. This results in faster implementation of AI features for customers — such as copilot
with automated suggestions and LLM-powered chat boxes that turn traditional queries into
their product, without typical
natural language questions to speed up investigations. This also helps cybersecurity providers
architectural complexity. building on a data platform that supports ML workloads more easily test and deploy ML
detections and anomaly detections.
3 Customers want solution Context is important for making timely security decisions. Security analysts cannot protect their
providers to share insights organization without the ability to correlate across datasets or insights. Cybersecurity providers
back to their security data lake, understand this need and are supporting their customers’ security data lake strategies by building
secure data-sharing capabilities that do not require APIs, ETLs or other tools for transferring data.
without APIs or ETLs.
These direct shares from vendor to customer remain private, secure and governed.
Bot Detection
Email Security
ONES TO WATCH ONES TO WATCH ONES TO WATCH ONES TO WATCH
ETL
Identity
* See Appendix: Detailed Methodology for additional details on selection and categorization of the referenced technologies.
* See Appendix: Detailed Methodology for additional details on selecti on and categorizati on of the referenced technologies.
LEADERS
HUNTERS
An alternative to legacy SIEM solutions, the Hunters SOC Platform empowers
security teams to automatically identify and respond to security incidents across their
entire attack surface. Hunters uses Snowflake features, like Snowpipe, to remove data
engineering challenges around ingesting security data into the Snowflake Data Cloud.
The Hunters platform delivers built-in, regularly updated, detection capabilities,
increasing the effectiveness of threat detection and eliminating the need to regularly
build and maintain detection rules. With Hunters, security teams can focus on their
unique use cases, knowing that Hunters’ detectors cover the majority of the threat
landscape. The Hunters platform automates the correlation of signals and alerts
from various sources — such as endpoint, detection and response (EDR), and cloud
and identity — as well as the triage and investigation process — to minimize the
time to respond and contain threats. Powered by Snowflake, Hunters helps security
professionals overcome volume, complexity and false positives. Learn more at
hunters.security.
ANVILOGIC GURUCUL
Anvilogic’s AI-powered Detection Engineering and Hunting Platform separates The Gurucul Security Analytics and Operations Platform enables customers to
analytics from your data layer, giving you the choice to adopt a security data lake seamlessly run Gurucul’s Next-Gen SIEM on the Data Cloud as a Snowflake
strategy (Snowflake) at your own pace alongside your SIEM or in place of it without Connected Application. Enterprises can consolidate all their enterprise and security
disrupting current investments and productivity. It results in up to 80% cost savings data into a single security data lake with next-gen analytics for real-time threat
while enabling teams to automate the end-to-end threat detection lifecycle across detection and automated response, addressing data breaches and internal and
disparate data lakes and tools that let you gain more coverage and a continuous view external threats. Additionally, customers can leverage Gurucul to analyze, correlate
into your detection posture against your highest-priority threats to reduce risk. and generate security alerts on data residing in Snowflake. Customers can improve
SOC efficiency, reduce threat detection time, decrease manual effort through
automation, and deliver analytics for automated detection and targeted threat
ELYSIUM ANALYTICS
response. Learn more about Gurucul at gurucul.com/technology-alliances/snowflake.
Elysium Analytics seamlessly integrates with Snowflake's Data Cloud through the
Snowflake connected application model, providing an extensive SIEM, Security
Analytics and Observability platform that enables users to maintain complete
ownership and data control, eliminating vendor lock-in. Elysium replicates the
Elasticsearch experience while incorporating open source, and accelerates threat
hunting and investigation through unified data. Elysium optimizes every aspect of
log management and analytics at scale, handling data ingestion, engineering, alerting
and machine learning. Elysium leverages Snowflake's unique features, such as Search
Optimization Service (SOS), Data Sharing and the Snowpark ML Modeling API. The
Snowpark ML Modeling API empowers users with self-service anomaly detection,
Behavioral Analysis, SIEM, Splunk optimization and compliance mapping.
LEADERS
LACEWORK
Lacework keeps organizations secure in the cloud, allowing them to innovate faster
with confidence. Cloud security requires a fundamentally new approach, and the
Lacework platform, Powered by Snowflake, is designed to scale with the volume,
variety and velocity of cloud data across an organization’s cloud environment: code,
identities, containers and multi-cloud infrastructure. Lacework provides security and
development teams with a correlated and prioritized end-to-end view that pinpoints
the largest risks and handful of security events that matter most. Lacework has a
deep pedigree in AI and machine learning, including nearly 200 patents and pending
applications, each of which touch AI. The Lacework Polygraph® Data Platform,
at the core of anomaly detection capabilities, implements unsupervised machine
learning functionality to identify malicious behavior and address alerts in a customer’s
environment without ever writing rules. Learn more at lacework.com.
WIZ
Wiz's Cloud Native Application Protection Platform (CNAPP) is designed to protect
everything built and run in the cloud. Wiz's agentless approach delivers instant
full-stack visibility, accurate risk prioritization and enhanced business agility. With
less noise, customers gain complete context about their workloads, configurations,
vulnerabilities and attack paths so security teams can focus their efforts on the
risks that matter most. Security teams and developers use Wiz to create a shared
understanding of their cloud threats and align to resolve issues earlier in the
development life cycle. Joint customers can automatically push Wiz-identified
cloud security issues to Snowflake for aggregate incident investigation and analysis,
accurate reporting on cloud security metrics, and easy storage that lights a path for
policymakers to make informed decisions, without any of the technical overhead.
Learn more at Wiz.io.
LEADERS
ANECDOTES
anecdotes' Cybersecurity Application, Powered by Snowflake, represents a game-
changing innovation in the world of compliance data processing. Addressing the need
for efficient and real-time compliance reporting, anecdotes leverages the Snowflake
Data Cloud to create a dynamic and agile platform. This platform streamlines the
complex task of regulatory compliance, allowing companies to gather, ingest, store
and analyze data quickly and effectively to manage their compliance programs. By
utilizing Snowflake's data platform and data-sharing capabilities, anecdotes ensures a
seamless experience for compliance professionals and eliminates the need for deep
data manipulation skills. anecdotes offers significant efficiency gains by aggregating
thousands of data sources per customer within Snowflake, thereby eliminating
the need for manual data aggregation. The integration of Snowpipe and external
automation models simplifies data processing, accelerating time-to-value for data and
compliance teams.
LEADERS
LEADERS
IPINFO
IPinfo helps convert internet traffic data into intelligence for thousands of customers
globally, across industries, from Fortune 500 enterprises to nonprofit organizations.
Cybersecurity teams and enterprise SOC departments can leverage this highly
contextualized IP address data to gain comprehensive insights into the functioning,
security and optimization of their organization’s assets across the internet ecosystem.
With datasets easily accessible in Snowflake Marketplace, forward-thinking security
professionals use IPinfo’s scalable data to fuel their apps and operations running on
the Snowflake Data Cloud. Learn more at: ipinfo.io/integrations/snowflake
21
Figma is a cloud-based design platform that helps teams brainstorm, design and build better
products together — from start to finish.
“Snowflake’s ecosystem
CHALLENGE
of modern security
Figma’s success has been fueled by multiple factors, Additionally, the costs of ingesting and retaining data
in traditional SIEM solutions across the industry,
tools and programming
including its commitment to data security and
protecting the organization from cyberthreats. “Figma forces security teams to silo security data in cold languages enables us to
aims to be the core tool for many designers, thinkers, storage. This siloed data architecture ultimately limits
and project managers, and so people need to trust the visibility of a security analyst. And as a result, do really novel, creative
us to keep their data safe and available,” Figma’s Staff adversaries are often identified months to a
Security Engineer, Max Burkhardt, said. year after they have already infiltrated the investigations that were
organization’s systems.
Sustained growth at Figma led to the rapid expansion
While fragmented logs and disjointed data lakes make
previously impossible.”
of customers, users, employees and security data.
Security teams need proper context from a variety of it hard for teams to combine data and collaborate, for
security logs and business contextual data to obtain Figma’s Head of Security, Devdatta Akhawe, staying
high-fidelity alerts and effectively investigate security ahead of security risks required a single, unified view —Devdatta Akhawe,
events. However, security data is often fragmented, of data. “Teams need to be able to use security tools
with data coming from identity platforms, cloud at scale and quickly respond to security incidents,” Head of Security, Figma
providers, SaaS applications and more. Akhawe said.
22
SOLUTION IMPACT
Seeking to build a modern security data program, the • Faster investigations with greater confidence.
security team discovered their data science teams For example, if an employee logs into Figma’s
at Figma had already been using Snowflake. By internal systems from an unusual IP address,
connecting Panther, a cloud-native SIEM tool, with previously that might have been a tedious, manual
Snowflake as their security data lake, Figma can store investigation that involves correlating employee
high volume datasets from multiple sources and easily information with security logs. Now, with business
query the data for further automated detections data, contextual data and security data all in one
and alerts. place within Snowflake, security engineers at
Figma can write a simple query to combine HR
Snowflake empowers the security team’s philosophy of
employee data with endpoint and login data to
“fearless logging.” According to Akhawe, “Most legacy
determine whether or not this is a malicious attack
security tools would not be able to handle the growth
or an employee authenticating from a new place.
we experienced in a way that scales reliably. Snowflake
A simple query within Snowflake can make event
as the core of our security data program allows us to
correlations easier and quicker, helping remove
ingest all the disparate logs without worrying about
false positive alerts.
scale or cost.”
• Achieve faster time to value with connected
The key ingredients for a modern security data
applications. Figma’s security engineers prefer
program include a scalable architecture to consolidate
utilizing Snowflake-connected applications, such
security data and an ecosystem of best-of-breed
as Panther, to run on top of their security data
security applications to run on top of that data.
lake instead of building and maintaining custom
Snowflake provides an all-in-one solution to help
applications. With Panther as a search engine,
security teams focus on what really matters.
Figma can write custom detections using SQL
and Python to analyze data and correlate events
across all of Figma’s security data.
23
Clari, a revenue collaboration and governance platform, allows every revenue-critical
employee to collaborate to stop revenue leak and deliver revenue precision. This enables
CEOs to answer the most important question in business: “Are we going to meet, beat or miss
on revenue?” In short, Clari is the only enterprise system that provides end-to-end revenue
collaboration and governance.
CHALLENGE IMPACT
Clari faced significant alert noise from their • Cut alerts from thousands per day to tens
rules-based legacy tools. Their remediation and • Streamlined SOC 2 and ISO 27001 compliance
investigation processes required optimization, and processes with data-rich dashboards
data silos created visibility gaps. With no access to
data stored in vendors, they were unable to gather • Increased visibility into cloud configurations
actionable insights. and applications
• Gained visibility into access and network
SOLUTION patterns
By working with Lacework and Snowflake together,
Clari enriched their data and aligned security insights
with business outcomes. They were able to receive
the right number of context-rich, actionable alerts
while gaining visibility into processes running in Java
and Python applications. With access to a large library
of integrations and easy deployment, both Lacework
and Snowflake helped Clari to quickly streamline their
security practice.
24
THE SNOWFLAKE DATA CLOUD:
THE PLATFORM FOR NEXT-GENERATION
CYBERSECURITY APPLICATIONS
We’ve identified the key players behind the next-generation One trend is clear: Snowflake is becoming a formidable application
cybersecurity applications by assessing actual usage of development platform of choice for many data-intensive cybersecurity
applications that are deployed on Snowflake Data Cloud. This applications. Many leading cybersecurity providers are choosing to
shows which technologies have traction among cybersecurity build on Snowflake because the platform streamlines their application
teams fighting against the latest cyberthreats. infrastructure, reducing operational complexities and cutting costs
while helping ensure easy scalability. Cybersecurity providers also want
to deliver new features to their customers quickly so they can stay
more secure.
25
APPENDIX:
DETAILED METHODOLOGY
The goal of this research was to identify the technologies that were developed with Snowflake which have achieved the greatest
customer adoption. The data covers a 12-month period, from Aug. 1, 2022 to July 31, 2023. The process was as follows:
Identify the full list of technologies for the cybersecurity ecosystem on Snowflake: Identify key metrics
• We looked at the full list of Powered by Snowflake technologies that were • The metrics for technologies using Snowflake’s core workloads for data
identified as cybersecurity applications. We also looked at the full list of Snowflake integration, analysis and transformation were:
Marketplace data providers that had an active listing under the “Security” filter.
■ Total number of active customers using the technology on Snowflake
• For each of the five identified categories — SIEM, compliance, cloud security,
■ Total credit consumption the technology uses on Snowflake
emerging segments and data enrichment — results only included those
companies that were active members of the Snowflake Partner Network (SPN) • For technologies using Snowflake’s collaboration capabilities:
or had a comparable agreement in place with Snowflake.
■ T
otal number of stable edges that include the technology. Stable edges are the
Split the five categories of technologies based on their type of Snowflake ongoing relationships between providers and consumers of data. A stable edge
consumption: The multiple workloads that exist in Snowflake, combined with the is defined as a data share that has produced at least 20 transactions in which
optionality of different application deployment models available, means that vendors compute resources are consumed and such consumption results in recognized
integrate with the Data Cloud in different ways and for different purposes. To product revenue over two successive three-week periods (with at least 20
accurately evaluate market leadership and adoption levels, particular metrics were transactions in each period).
applied to providers based on their type of Snowflake consumption. Specifically, the
analysis consisted of splitting the technology providers into two broader categories:
technologies that use Snowflake’s workloads for data integration, transformation and
analysis; and technologies using Snowflake’s collaboration workload.
26
APPENDIX:
DETAILED METHODOLOGY
Generate an index based on the type of Snowflake usage that illustrates the level Rank/select the marketing technologies from 1 to N, where the lower number
of market penetration achieved by the technology, and complement it with how (ranking) is more favorable. Combine the full list of technologies across both groups
deep that usage is. The calculation is based on the following weighted criteria: and normalize this ranking between 0-100. (A score of 100 would be the technology
ranked first across every metric.)
• Technologies using Snowflake’s core workloads for data integration, analysis
and transformation: • eaders represent the top technologies with the highest index in each category.
L
Note that Leaders in the Emerging Segment category did not necessarily have
■ Breadth (50%): number of active customers
more than 2 technologies in that category, but were selected based on multiple
■ Depth (50%): total credit consumption factors, such as strong recent momentum in the market, innovative technology
or approach with Snowflake, or having recently demonstrated strong
• Data enrichment category:
customer capabilities.
■ B
readth (100%): number of stable edges, to prioritize measuring collaboration
• nes to Watch followed the leaders in their standing in primary categories
O
for enrichment purposes rather than size of different organizations’ datasets
such as security information event management, cloud security, compliance
and data enrichment.
• here are technologies that were evaluated but are not mentioned in the report
T
due to their decision to not participate or they were in adjacent industries such
as data security, governance and observability.
27
ABOUT SNOWFLAKE
Snowflake enables every organization to mobilize their data with Snowflake’s Data Cloud. Customers use the Data Cloud
to unite siloed data, discover and securely share data, and execute diverse artificial intelligence (AI) / machine learning
(ML) and analytic workloads. Wherever data or users live, Snowflake delivers a single data experience that spans multiple
clouds and geographies. Thousands of customers across many industries, including 639 of the 2023 Forbes Global 2000
(G2K) as of July 31, 2023, use the Snowflake Data Cloud to power their businesses.
Learn more at snowflake.com
© 2023 Snowflake Inc. All rights reserved. Snowflake, the Snowflake logo, and all other Snowflake product, feature and service names mentioned herein
are registered trademarks or trademarks of Snowflake Inc. in the United States and other countries. All other brand names or logos mentioned or used
herein are for identification purposes only and may be the trademarks of their respective holder(s). Snowflake may not be associated with, or be
sponsored or endorsed by, any such holder(s).