Page 169 - Cyber Defense eMagazine January 2024
P. 169
deployment and time to value. Typically, native XDR solutions can be integrated with other
security products of the same vendor and have limited interoperability with other vendor security
products.
2. Growth of attribute- or context-based access control and the decline of pure, role-based
access control
Passwordless authentication is becoming a component of a zero-trust architecture. Some enterprises
eliminate passwords whenever possible, but to attain the actual state of zero trust architecture, it is
imperative to consider other options.
• Security solutions that offer passwordless authentication are gaining prominence among
enterprises as they reduce user log-in friction and strengthen system resilience by adding an AI-
powered layer of security.
• Some identity and access management (IAM) vendors have acquired start-ups and technology
companies to launch AI-driven passwordless authentication platforms that use behavioral data to
interpret suspicious activities.
3. Acceleration of managed security services (MSS) and managed detection and response
(MDR) services
MSS and MDR services empower enterprises to strengthen their cybersecurity frameworks, mitigate risks
and respond effectively to security incidents. Outsourcing these services to experts frees organizations
to focus on their core competencies.
MSS: Large enterprises need a full range of MSS, including data security, threat intelligence and
analytics, incident response, security risk and compliance services and rapid response and recovery to
cyberthreats. MSS providers help these enterprises develop and implement a comprehensive security
strategy and roadmap.
MDR: Phishing and ransomware attacks are the most common security breaches for small and medium
businesses. These businesses need end-to-end threat detection and response capabilities to protect
sensitive corporate data and assets, but they lack the budget and expertise to implement robust security
measures. MDR service providers offer network and endpoint monitoring, incident analysis and response
and proactive threat hunting.
4. Incident response assessments and virtual CISO services are gaining momentum
The shortage of skilled experts is a challenge in the industry, and enterprises of all sizes are struggling
to hire well-qualified and experienced CISOs. As an alternative, some enterprises are choosing virtual
CISO or CISO on-demand services from cybersecurity consulting firms, MSSPs and independent
Cyber Defense eMagazine – January 2024 Edition 169
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.