How AI/ML, search, and analytical applications are developed and deployed to transform enterprise cybersecurity.
Security teams rely on effective cybersecurity solutions and platforms to transform large volumes of raw data into actionable insights. The next-generation of cybersecurity solutions are built on a scalable cloud data platform that supports fast search, generative AI (gen AI), machine learning (ML), embedded analytics, and more, and it’s delivered where security teams already work.
Using aggregated usage data, our report, The Next Generation of Cybersecurity Applications, identifies security technology leaders and “ones to watch” across five categories that are delivering next-generation applications and data sharing capabilities Powered by Snowflake to enterprise security teams. Security teams who want to deploy a security data lake strategy to achieve data-driven and cost-effective results at scale, can use this report as an ecosystem guide.
Download the Report
THE FORCES SHAPING CYBERSECURITY STRATEGY
AND TECH INVESTMENT
The report highlights leading technology providers in the following categories and how they’re developing new functionalities to drive visibility and automation for security teams.
- Methodology
The goal of this research was to identify the technologies that were developed with Snowflake which have achieved the greatest customer adoption. The data covers a 12-month period, from Aug. 1, 2022 to July 31, 2023.
The process was as follows:
Identify the full list of technologies for the cybersecurity ecosystem on Snowflake
- We looked at the full list of Powered by Snowflake technologies that were identified as Cybersecurity applications. We also looked at the full list of Snowflake Marketplace data providers that had an active listing under the “Security” filter.
- For each of the five identified categories — SIEM, compliance, cloud security, emerging segments and data enrichment — results only included those companies that were active members of the Snowflake Partner Network (SPN) or had a comparable agreement in place with Snowflake.
Split the five categories of technologies based on their type of Snowflake consumption
The multiple workloads that exist in Snowflake, combined with the optionality of different application deployment models available, meant that vendors integrate with the Data Cloud in different ways and for different purposes. To accurately evaluate market leadership and adoption levels, particular metrics were applied to providers based on their type of Snowflake consumption. Specifically, the analysis consisted of splitting the technology providers into two broader categories: Technologies that use Snowflake’s workloads for data integration, transformation and analysis; and technologies using Snowflake’s collaboration workload.
Identify key metrics
The metrics for technologies using Snowflake’s core workloads for data integration, analysis and transformation were:
- Total number of active customers using the technology on Snowflake
- Total credit consumption the technology uses on Snowflake
- Total number of stable edges that include the technology (for technologies using Snowflake’s collaboration capabilities)
- Stable edges are the ongoing relationships between providers and consumers of data. A stable edge is defined as a data share that has produced at least 20 transactions in which compute resources are consumed and such consumption results in recognized product revenue over two successive three-week periods (with at least 20 transactions in each period).
Generate an index based on the type of Snowflake usage that illustrates the level of market penetration achieved by the technology, and complement it with how deep that usage is
The calculation was based on the following weighted criteria:
- Technologies using Snowflake’s core workloads for data integration, analysis and transformation:
- Breadth (50%): number of active customers
- Depth (50%): total credit consumption
- Data enrichment category:
- Breadth (100%): Number of stable edges, to prioritize measuring collaboration for enrichment purposes rather than size
Rank/select the marketing technologies from 1 to N, where the lower number (ranking) is more favorable
Combine the full list of technologies across both groups and normalize this ranking between 0-100. (A score of 100 would be the technology ranked first across every metric.)
- Leaders represent the top technologies with the highest index in each category. Note that Leaders in the Emerging Segment category did not necessarily have more than 2 technologies in that category, but were selected based on multiple factors such as strong recent momentum in the market, innovative technology or approach with Snowflake, or having recently demonstrated strong customer capabilities.
- Ones to Watch followed the leaders in their standing in primary categories such as security information event management, cloud security, compliance, and data enrichment.
- There are technologies that were evaluated but are not mentioned in the report due to their decision to not participate or they were in adjacent industries such as data security, governance, and observability.
THE next generation
of cybersecurity applications
download now