The Next Generation of Cybersecurity Applications (2024)

How AI/ML, search, and analytical applications are developed and deployed to transform enterprise cybersecurity.

Security teams rely on effective cybersecurity solutions and platforms to transform large volumes of raw data into actionable insights. The next-generation of cybersecurity solutions are built on a scalable cloud data platform that supports fast search, generative AI (gen AI), machine learning (ML), embedded analytics, and more, and it’s delivered where security teams already work.

Using aggregated usage data, our report, The Next Generation of Cybersecurity Applications, identifies security technology leaders and “ones to watch” across five categories that are delivering next-generation applications and data sharing capabilities Powered by Snowflake to enterprise security teams. Security teams who want to deploy a security data lake strategy to achieve data-driven and cost-effective results at scale, can use this report as an ecosystem guide.

The Next Generation of Cybersecurity Applications (1)

Download the Report

THE FORCES SHAPING CYBERSECURITY STRATEGY
AND TECH INVESTMENT

The report highlights leading technology providers in the following categories and how they’re developing new functionalities to drive visibility and automation for security teams.

The Next Generation of Cybersecurity Applications (2)

  • Methodology

    The goal of this research was to identify the technologies that were developed with Snowflake which have achieved the greatest customer adoption. The data covers a 12-month period, from Aug. 1, 2022 to July 31, 2023.

    The process was as follows:

    Identify the full list of technologies for the cybersecurity ecosystem on Snowflake

    • We looked at the full list of Powered by Snowflake technologies that were identified as Cybersecurity applications. We also looked at the full list of Snowflake Marketplace data providers that had an active listing under the “Security” filter.
    • For each of the five identified categories — SIEM, compliance, cloud security, emerging segments and data enrichment — results only included those companies that were active members of the Snowflake Partner Network (SPN) or had a comparable agreement in place with Snowflake.

    Split the five categories of technologies based on their type of Snowflake consumption

    The multiple workloads that exist in Snowflake, combined with the optionality of different application deployment models available, meant that vendors integrate with the Data Cloud in different ways and for different purposes. To accurately evaluate market leadership and adoption levels, particular metrics were applied to providers based on their type of Snowflake consumption. Specifically, the analysis consisted of splitting the technology providers into two broader categories: Technologies that use Snowflake’s workloads for data integration, transformation and analysis; and technologies using Snowflake’s collaboration workload.

    Identify key metrics

    The metrics for technologies using Snowflake’s core workloads for data integration, analysis and transformation were:

    • Total number of active customers using the technology on Snowflake
    • Total credit consumption the technology uses on Snowflake
    • Total number of stable edges that include the technology (for technologies using Snowflake’s collaboration capabilities)
      • Stable edges are the ongoing relationships between providers and consumers of data. A stable edge is defined as a data share that has produced at least 20 transactions in which compute resources are consumed and such consumption results in recognized product revenue over two successive three-week periods (with at least 20 transactions in each period).

    Generate an index based on the type of Snowflake usage that illustrates the level of market penetration achieved by the technology, and complement it with how deep that usage is

    The calculation was based on the following weighted criteria:

    • Technologies using Snowflake’s core workloads for data integration, analysis and transformation:
      • Breadth (50%): number of active customers
      • Depth (50%): total credit consumption
    • Data enrichment category:
      • Breadth (100%): Number of stable edges, to prioritize measuring collaboration for enrichment purposes rather than size

    Rank/select the marketing technologies from 1 to N, where the lower number (ranking) is more favorable

    Combine the full list of technologies across both groups and normalize this ranking between 0-100. (A score of 100 would be the technology ranked first across every metric.)

    • Leaders represent the top technologies with the highest index in each category. Note that Leaders in the Emerging Segment category did not necessarily have more than 2 technologies in that category, but were selected based on multiple factors such as strong recent momentum in the market, innovative technology or approach with Snowflake, or having recently demonstrated strong customer capabilities.
    • Ones to Watch followed the leaders in their standing in primary categories such as security information event management, cloud security, compliance, and data enrichment.
    • There are technologies that were evaluated but are not mentioned in the report due to their decision to not participate or they were in adjacent industries such as data security, governance, and observability.

THE next generation
of cybersecurity applications

The Next Generation of Cybersecurity Applications (3)

download now

The Next Generation of Cybersecurity Applications (2024)
Top Articles
How to Get Started in Real Estate Investing [Beginners Guide] - T.W.L.
Barn Conversion Mortgages: Get It At Best Rates (2024)
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Selly Medaline
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 6667

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.