Gartner Research Reprints – Hype Cycle for Cloud Security

Complimentary Download - Gartner report: Hype Cycle for Cloud Security, 2020

According to Gartner, "this Hype Cycle encompasses innovations and technologies that improve the security, governance and reliability of public and private cloud computing. Security continues to be a commonly cited reason for avoiding use of the public cloud, but most enterprises are approaching the consensus that the public cloud can be made secure enough for most use cases. Cloud service providers (CSPs) rarely suffer security failures that directly affect their customers; but customers of these services often don’t know how to use them securely (which, at times, can be challenging to accomplish), or lack the skills and tools to verify secure use. The multiple security tools and innovations in this Hype Cycle strongly suggest organizations using the cloud are not always finding CSP-provided security mechanisms to be adequate, especially for multicloud deployments." Download this complimentary Gartner research report, we believe: 

Hype Cycle for Cloud Security

 

  • Learn more on the priority matrix for cloud security, its benefits and years of mainstream adoption.
  • Identify the position, speed of adoption and maturity level. 
  • Review users advice and business impact. 
  • Evaluate sample vendors in the space for container and cloud security.

This Gartner report shows that "Security leaders who can reorient their roles around “business enablement” will find that their technical, conceptual and practical experiences make them ideally suited to help their organizations make controlled, compliant and economical use of the public cloud. This Hype Cycle provides a summary of the most important new mechanisms that will enable that mission."

Now Integrate Security into Your DevOps Toolchain

This complimentary Gartner report is brought to you by NeuVector, the leader in Full-Lifecycle Container Security

  • Protect containers from DevOps to Run-Time
  • Full lifecycle vulnerability management and compliance checks
  • Implement 'security policy as code' to quickly deploy secure applications
  • Protect east-west container traffic with the only cloud-native container firewall with Layer 7 deep packet inspection, DLP, and built-in threat detection
  • Monitor running containers & hosts for violations, threats, break outs, and vulnerabilities
  • Audit security settings of hosts, Docker daemon, and containers for internal and external compliance

Learn More ...

 

***Gartner, Hype Cycle for Cloud Security, 2020, Steve Riley, Jay Heiser and Tom Croll, 17, July 2020.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. 

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request. All rights reserved.