Table of Contents
- Summary
- Market Categories and Deployment Types
- Key Criteria Comparison
- GigaOm Radar
- Vendor Insights
- Analyst’s Take
- Methodology
- About Paul Stringfellow
- About GigaOm
- Copyright
1. Summary
All businesses face significant and complex cybersecurity challenges.
- Threats are constant and evolving rapidly; they can be targeted or random, malicious or accidental, and come from outside or inside an organization. Regardless of the origin, the impact is the same: major disruption, loss of business, reputational damage, and even legal action.
- There are hundreds of cybersecurity technology vendors, all with different approaches, answers, and tools to thwart cybercriminals.
- Increasingly, security and IT teams are asked to make do with fewer resources and smaller budgets.
- Exacerbating these issues are major skills shortages, leaving many businesses without the expertise to handle a cybersecurity incident.
These challenges and more present a dizzying array of considerations for security teams.
To combat growing complexity and shrinking resources, organizations are seeking external support—providers that can either augment the organization’s existing internal skills and tools with a more proactive detection and response service, or to whom they can fully outsource their security management.
For organizations that do not yet have all of the internal tools and resources they need, managed detection and response (MDR) service providers make an attractive proposition. These vendors provide services that augment (not replace) organizations’ existing inhouse skills to help them more quickly identify and mitigate risk and improve their security posture.
MDR service providers focus on proactive threat hunting, detection, and response, using innovative and intelligent security tools deployed across an organization’s infrastructure, normally on its endpoints. These tools are typically proprietary and will either replace or co-exist with a company’s existing security tools. Often, these providers use their own endpoint detection and response (EDR) or extended detection and response (XDR) tools, which can be deployed and operated by their customers.
This GigaOm Radar report highlights key MDR vendors and equips IT decision-makers with the information needed to select the best fit for their business and use case requirements. In the corresponding GigaOm report “Key Criteria for Evaluating Managed Security Services,” we describe in more detail the key features and metrics that are used to evaluate vendors in this market.
How to Read this Report
This GigaOm report is one of a series of documents that helps IT organizations assess competing solutions in the context of well-defined features and criteria. For a fuller understanding, consider reviewing the following reports:
Key Criteria report: A detailed market sector analysis that assesses the impact that key product features and criteria have on top-line solution characteristics—such as scalability, performance, and TCO—that drive purchase decisions.
GigaOm Radar report: A forward-looking analysis that plots the relative value and progression of vendor solutions along multiple axes based on strategy and execution. The Radar report includes a breakdown of each vendor’s offering in the sector.
Solution Profile: An in-depth vendor analysis that builds on the framework developed in the Key Criteria and Radar reports to assess a company’s engagement within a technology sector. This analysis includes forward-looking guidance around both strategy and product.