The Next Generation of Cybersecurity Applications (2024)

How AI/ML, search, and analytical applications are developed and deployed to transform enterprise cybersecurity.

Security teams rely on effective cybersecurity solutions and platforms to transform large volumes of raw data into actionable insights. The next-generation of cybersecurity solutions are built on a scalable cloud data platform that supports fast search, generative AI (gen AI), machine learning (ML), embedded analytics, and more, and it’s delivered where security teams already work.

Using aggregated usage data, our report, The Next Generation of Cybersecurity Applications, identifies security technology leaders and “ones to watch” across five categories that are delivering next-generation applications and data sharing capabilities Powered by Snowflake to enterprise security teams. Security teams who want to deploy a security data lake strategy to achieve data-driven and cost-effective results at scale, can use this report as an ecosystem guide.

The Next Generation of Cybersecurity Applications (1)

Download the Report

THE FORCES SHAPING CYBERSECURITY STRATEGY
AND TECH INVESTMENT

The report highlights leading technology providers in the following categories and how they’re developing new functionalities to drive visibility and automation for security teams.

The Next Generation of Cybersecurity Applications (2)

  • Methodology

    The goal of this research was to identify the technologies that were developed with Snowflake which have achieved the greatest customer adoption. The data covers a 12-month period, from Aug. 1, 2022 to July 31, 2023.

    The process was as follows:

    Identify the full list of technologies for the cybersecurity ecosystem on Snowflake

    • We looked at the full list of Powered by Snowflake technologies that were identified as Cybersecurity applications. We also looked at the full list of Snowflake Marketplace data providers that had an active listing under the “Security” filter.
    • For each of the five identified categories — SIEM, compliance, cloud security, emerging segments and data enrichment — results only included those companies that were active members of the Snowflake Partner Network (SPN) or had a comparable agreement in place with Snowflake.

    Split the five categories of technologies based on their type of Snowflake consumption

    The multiple workloads that exist in Snowflake, combined with the optionality of different application deployment models available, meant that vendors integrate with the Data Cloud in different ways and for different purposes. To accurately evaluate market leadership and adoption levels, particular metrics were applied to providers based on their type of Snowflake consumption. Specifically, the analysis consisted of splitting the technology providers into two broader categories: Technologies that use Snowflake’s workloads for data integration, transformation and analysis; and technologies using Snowflake’s collaboration workload.

    Identify key metrics

    The metrics for technologies using Snowflake’s core workloads for data integration, analysis and transformation were:

    • Total number of active customers using the technology on Snowflake
    • Total credit consumption the technology uses on Snowflake
    • Total number of stable edges that include the technology (for technologies using Snowflake’s collaboration capabilities)
      • Stable edges are the ongoing relationships between providers and consumers of data. A stable edge is defined as a data share that has produced at least 20 transactions in which compute resources are consumed and such consumption results in recognized product revenue over two successive three-week periods (with at least 20 transactions in each period).

    Generate an index based on the type of Snowflake usage that illustrates the level of market penetration achieved by the technology, and complement it with how deep that usage is

    The calculation was based on the following weighted criteria:

    • Technologies using Snowflake’s core workloads for data integration, analysis and transformation:
      • Breadth (50%): number of active customers
      • Depth (50%): total credit consumption
    • Data enrichment category:
      • Breadth (100%): Number of stable edges, to prioritize measuring collaboration for enrichment purposes rather than size

    Rank/select the marketing technologies from 1 to N, where the lower number (ranking) is more favorable

    Combine the full list of technologies across both groups and normalize this ranking between 0-100. (A score of 100 would be the technology ranked first across every metric.)

    • Leaders represent the top technologies with the highest index in each category. Note that Leaders in the Emerging Segment category did not necessarily have more than 2 technologies in that category, but were selected based on multiple factors such as strong recent momentum in the market, innovative technology or approach with Snowflake, or having recently demonstrated strong customer capabilities.
    • Ones to Watch followed the leaders in their standing in primary categories such as security information event management, cloud security, compliance, and data enrichment.
    • There are technologies that were evaluated but are not mentioned in the report due to their decision to not participate or they were in adjacent industries such as data security, governance, and observability.

THE next generation
of cybersecurity applications

The Next Generation of Cybersecurity Applications (3)

download now

The Next Generation of Cybersecurity Applications (2024)
Top Articles
How do I protect my holiday?
Does Kraken Have a Wallet?
Netr Aerial Viewer
Printable Whoville Houses Clipart
Melson Funeral Services Obituaries
Food King El Paso Ads
Week 2 Defense (DEF) Streamers, Starters & Rankings: 2024 Fantasy Tiers, Rankings
Fat People Falling Gif
Nehemiah 4:1–23
CLI Book 3: Cisco Secure Firewall ASA VPN CLI Configuration Guide, 9.22 - General VPN Parameters [Cisco Secure Firewall ASA]
Kagtwt
Lost Pizza Nutrition
Uc Santa Cruz Events
Assets | HIVO Support
Hood County Buy Sell And Trade
Craigslist Mpls Cars And Trucks
Sony E 18-200mm F3.5-6.3 OSS LE Review
Truth Of God Schedule 2023
Me Cojo A Mama Borracha
Morristown Daily Record Obituary
Webcentral Cuny
Sister Souljah Net Worth
Criglist Miami
Barbie Showtimes Near Lucas Cinemas Albertville
Kiddie Jungle Parma
Tokioof
APUSH Unit 6 Practice DBQ Prompt Answers & Feedback | AP US History Class Notes | Fiveable
Melissa N. Comics
P3P Orthrus With Dodge Slash
Blackstone Launchpad Ucf
Diana Lolalytics
Senior Houses For Sale Near Me
Black Adam Showtimes Near Amc Deptford 8
Western Gold Gateway
Foolproof Module 6 Test Answers
Babylon 2022 Showtimes Near Cinemark Downey And Xd
Scanning the Airwaves
Body Surface Area (BSA) Calculator
How to play Yahoo Fantasy Football | Yahoo Help - SLN24152
Topos De Bolos Engraçados
Weather Underground Corvallis
Owa Hilton Email
Ds Cuts Saugus
Cch Staffnet
Xre 00251
Server Jobs Near
Wzzm Weather Forecast
Bf273-11K-Cl
Minute Clinic Mooresville Nc
Wera13X
What your eye doctor knows about your health
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 6667

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.