没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
This research note is restricted to the personal use of danrob2@washington.edu.
This research note is restricted to the personal use of danrob2@washington.edu.
Magic Quadrant for Security Awareness
Computer-Based Training
Published: 18 July 2019 ID: G00378818
Analyst(s): Joanna Huisman
People influence security more than technology or policy, and cybercriminals
know how to exploit human behaviors. Security and risk management
leaders should invest in tools that increase awareness and influence
behavior that supports security business objectives through computer-
based training.
Strategic Planning Assumption
By 2022, 60% of large/enterprise organizations will have comprehensive security awareness training
programs, with at least one dedicated full-time equivalent (FTE) for fulllment.
Market Denition/Description
This document was revised on 24 July 2019. The document you are viewing is the corrected
version. For more information, see the Corrections page on gartner.com.
People affect security outcomes more than technology, policies or processes. The market for
security awareness computer-based training (CBT) is driven by the recognition that, without perfect
cybersecurity protection systems, people play a critical role in an organization’s overall security and
risk posture. This role is dened by inherent strengths and weaknesses: people’s ability to learn and
their vulnerability to error, exploitation and manipulation.
End-user-focused security education and training is a rapidly growing market. Demand is fueled by
the needs of security and risk management (SRM) leaders to help inuence the behaviors that affect
the security of employees, citizens and consumers.
Interactive CBT is a central component of comprehensive security education and behavior
management programs. The focus and structure of the content delivered by CBT vary, as do the
duration of individual CBT modules and the type of computing endpoints supported. Understanding
the diversity of people in the organization is as important to SRM leaders as understanding how
security ts into an organization’s larger goals.
This research note is restricted to the personal use of danrob2@washington.edu.
This research note is restricted to the personal use of danrob2@washington.edu.
Security needs require chief information security ofcers (CISOs) and employee communication
leaders — such as human resource (HR) managers — to recognize the increasing impact of
employee behavior on enterprise SRM efcacy. This is due in no small part to increased enterprise
and employee adoption of mobile, Internet of Things (IoT) and cloud products.
Security Awareness Is a Far-Reaching Concept
As often emphasized in Gartner research on security awareness, security decisions are closely
linked to business objectives. This research focuses on the appreciable market space in which
education materials are offered. In this research, Gartner uses “security education” to refer to the
overarching set of activities and objectives that elevates security competencies and motivates
employees to make better decisions in line with the organization data security postures. The
organization’s education process should prepare the staff for decisions that align with enterprise
security performance objectives and expectations.
Awareness of threats and mitigating actions is one function of a security education program. Direct
behavioral conditioning — such as anti-phishing projects (see Note 1) — is another form of security
education. Others include security communication and internal marketing campaigns, involving
posters, competitions and advertising-style messaging.
Products with different objectives for security education share the ultimate goal of supporting
enterprise requirements for the management of security risks. Security education can fulll multiple
objectives and requirements, including:
■
Complying with regulations that mandate security training
■
Establishing clear behavioral guidelines to support disciplinary processes, which are typically
described in acceptable-use and/or security policies
■
Improving employee knowledge of security and risk topics
■
Motivating desired security behaviors in the appropriate context
Education and awareness CBT are licensed on a per-user, per-year pricing structure, with limited
exceptions.
Security education CBT is suitable for organizations of all sizes and is of particular use to
geographically distributed organizations that need common security performance across all
employee groups. The increasing diversity of CBT offerings requires prospective buyers to clarify
the learning outcomes they are looking for prior to vendor engagement.
Relevancy and adaptation are key imperatives for SRM leaders. Most organizations have invested in
some form of security awareness activities for decades. New technologies, threats and patterns of
work compel organizations to seek more-sophisticated behavioral support approaches. These
incorporate a broad range of deployment models, increased frequency of learning opportunities,
context-specic training content and structure, and metrics that support continued investment in
awareness and security education.
Page 2 of 29
Gartner, Inc. | G00378818
This research note is restricted to the personal use of danrob2@washington.edu.
This research note is restricted to the personal use of danrob2@washington.edu.
Many SRM leaders prioritize the evidence of the effectiveness, or ROI, of the security awareness
program. The result is an increasing demand for the measurement of persistent learning outcomes.
Some organizations offer preassessment, so that employees can “test out” some of the courseware,
if they are able to demonstrate knowledge mastery, and to create a baseline by which future
performance can be measured.
The market for CBT for security awareness is characterized by vendor portfolios that include ready-
to-use, interactive software modules. These modules are available as internet-based services or on-
premises deployments via client-managed learning management systems (LMSs) and vendor
support for the Sharable Content Object Reference Model (SCORM) standard. The products
included in this Magic Quadrant support multilingual and multicultural audiences — that is, they are
available in English and at least one other language. They offer delivery via a variety of digital
endpoints and assessments of trainee participation and completion.
Vendors that support this market target end-user organizations of all sizes. However, enterprise
clients commonly demand ancillary capabilities, such as customization of content, creation of new
content, and advanced assessment and reporting capabilities (see “Effective Security Awareness
Starts With Dened Objectives”). They must also integrate security education CBT into a consistent
program of security maturity improvement across the enterprise.
Market Trends
As products in this market mature, each vendor looks to differentiate its products and services in a
variety of ways. At the end of the day, content continues to be paramount. Vendor differentiators in
2018 and 2019 are described in the sections that follow.
Variety of Content Formats, Lengths and Styles, Including Mobile Capabilities
Content continues to be the most prominent differentiator. Many clients and vendors recognize that
their security training cannot effectively be approached with a “one-size-ts-all” mentality. They are
developing content of different lengths (one- to two-minute microlearning lessons, interactive
lessons, and episode-based, Netix-like shows) and in different styles — e.g., ranging from
extremely corporate-friendly and “safe” to more edgy, humorous styles. Learners have different
styles (e.g., visual, aural, logical, verbal, physical, social and solitary), which means audiences can
receive the same information in multiple forms, thereby increasing the possibility for information
absorption and retention. Customization of content also addresses the needs of particular roles or
audiences. For instance, although training for all audiences should include foundational awareness,
there may be a need for additional/different training for call center employees, executives or HR
personnel.
Many vendors are also offering content that reects diversity of characters (elements of the learning)
with a more global perspective. The more relatable the content is to the learner, the more interested
and engaged they will be. This also increases the potential of increased followership across your
awareness curriculum. The potential for mobile attack is increasing. Many vendors offer not only
content that can be delivered via mobile device, but also phishing campaigns. Clients that have
Gartner, Inc. | G00378818
Page 3 of 29
This research note is restricted to the personal use of danrob2@washington.edu.
This research note is restricted to the personal use of danrob2@washington.edu.
large moving populations need to consider “learning-on-the-go” and a good alternative to
traditional CBT methods.
Gamication
Some vendors include a focus on gamication, although the denition of gamication varies from
vendor to vendor. Clients initially expect an experience that is similar to Xbox or PlayStation, but
quickly realize that the security awareness gamied content is nowhere near that level of
sophistication. In this context, “gamication” includes the establishment of multidepartment
leaderboards and badges, so that departments/employees are ranked against each other in various
ways. Some vendors that provide gamication as an option are also thinking differently about
reward and recognition options for users who exhibit heightened security behaviors (see “Rewards
and Consequences Motivate Employee Secure Behavior”). Some vendors are also introducing
virtual reality content to provide learners with unique experiences.
Multilanguage Support
Most long-standing vendors offer support for all major language groups. However, many vendors
are now distinguishing themselves by offering out-of-the-box language support for 20 or more
languages, and some offer more than 50 languages, including cultural variants/dialects of
languages. However, Gartner recommends that organizations verify the accuracy of languages with
their own in-country personnel before deploying pretranslated materials. Although some vendors
promote many languages, only subsets of their library are offered in every language. Demand
clarication upfront on what is translated into all the languages you require across your enterprise.
Supplemental Internal Marketing Content
In recognizing that SRM leaders are not full-time content writers, graphic designers or marketing
experts, many security awareness CBT vendors offer large libraries of predesigned content to serve
as additional/supplemental campaign artifacts or for ad hoc communications. These can include
materials for newsletters, intranet postings, emails, security alerts, digital banners and security
information for families and more.
Competitive Pricing
Price continues to be the biggest disruptor in the market. As a result, most of the vendors in this
space offer some free CBT or internal marketing materials. Some vendors have adjusted pricing
downward to differentiate on price and to seek a large share of the small or midsize business (SMB)
market, which will not tolerate traditional pricing for products. The current pricing environment feels
like a race to the bottom; it is certainly a buyer’s market, in which the art of negotiation and
competitive bids go a long way toward savings for like services. Gartner cautions clients to ensure
they’re comparing the price of “like” products and services.
Integration Partnerships and Possibilities
Some vendors are also exploring interesting partnerships with core security technology vendors,
such as employee-monitoring vendors, endpoint detection and response (EDR) vendors, endpoint
Page 4 of 29
Gartner, Inc. | G00378818
This research note is restricted to the personal use of danrob2@washington.edu.
This research note is restricted to the personal use of danrob2@washington.edu.
protection platform (EPP) vendors, secure email gateway (SEG) vendors, data security vendors and
others. The goal of such partnerships is to be able to:
■
Leverage real-time data generated or collected by core technologies
■
Log data to provide just-in-time learning, based on observed unsecure behavior exhibited by an
employee
■
Provide a comprehensive product that covers technology to human behavior
When unsecure or risky behavior is logged, the behavior could trigger autoenrollment into a
contextually relevant training module. This is a natural evolution of the anti-phishing behavior
management market. The aim is to create observed and individualized, behavior-based training
specically relevant to the learner.
Market Dynamics and Growth
The market for security awareness CBT became dynamic in 2017, and this dynamism continues.
Multiple mergers and acquisitions occurred in 2018, resulting in market consolidation. This
movement indicates an ongoing trend — i.e., additional mergers and acquisitions (M&A). This
research focuses primarily on the vendor market performance during the 2018 calendar year, but
also includes market and capability changes that took place in the rst quarter of 2019.
In 2018, the market grew to roughly $451 million, which falls approximately $40 million short of our
original projection. This miss was the result of inaccurate reporting from two separate vendors.
However, all indications suggest that the market is well-positioned for high growth and will remain
so during the next ve years. We estimate the market will grow by approximately 47% in 2019 and
reach $660 million (see Note 2). Gartner continues to experience an increase in inquiries year over
year, as end-user organizations continue to struggle with changing employee behaviors with respect
to the security and protection of valuable assets.
The market has experienced nearly 25% growth from 2017 through 2018. Most organizations of any
size need to provide security training for their employees, due to regulatory requirements and other
internal objectives. Product vendors mine a large, anticipated, total addressable market
(approximately $2.5 billion, depending on product price tolerances). Gartner anticipates the market
will grow at a 42% compound annual growth rate (CAGR) through at least 2023.
Advice to SRM Leaders Purchasing Security Awareness CBTs
CISOs and other purchasers of security awareness CBT products should resist basing their vendor
evaluations solely on technical/functional requirements. Security awareness materials are the
touchpoint of the security department for the rest of the organization. As such, ensuring that the
tone, production value, and overall look and feel of the product are a good match for your specic
organization is fundamental to success. Comparisons are important when considering interfaces
and user experience. If the product you are evaluating does not have content and an interface that
is as good as or better than anything else your company has released, then other vendors should be
evaluated.
Gartner, Inc. | G00378818
Page 5 of 29
剩余28页未读,继续阅读
资源评论
xueyunshengling
- 粉丝: 596
- 资源: 3412
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 三相电流型PWM整流matlab双闭环控制策略仿真与文献解析说明书,三相电流型PWM整流matlab仿真,采用电压外环和电流内环的双闭环控制策略,附赠自己整理的说明文档和几篇参考文献 ,核心关键词
- "MATLAB智能算法应用详解:案例研究与实践",MATLAB智能算法,相关案例 只有word,没有具体代码,代码截图均直接插入到word中,有详细案例说明,包括案例研究内容+智能算法+研究结果说明
- 电力市场两阶段投标策略:充电站集群模型与可调度潜力评估,基于Matlab和Gurobi的仿真研究,两阶段市场投标策略 电力市场程序 日前日内竞价 提出了日前电力市场和实时电力市场下充电站的
- "基于日气象特征因素的支持向量机负荷预测方法研究-使用Matlab编制模型算法程序与实验分析",选取基于日特征气象因素的支持向量机预测方法,用Matlab编制模型的算法程序,从数据集中选取若干天数的
- 混合式全桥LLC谐振变换器:变频控制与移相控制的完美结合,闭环控制输出电压,实现软开关与自动调频移相切换,稳定波形展示,变频控制与移相控制组成的混合式控制全桥LLC谐振变器仿真(PFM+PSM混合控制
- 奥的斯锐进变频器电路图解析与原理图纸详解:探讨变频器维修与电路图应用,奥的斯变频器维修原理图纸 奥的斯锐进变频器电路图,402 403 404 406变频器 ,核心关键词:奥的斯变频器;维修原理;图
- 基于Python实现的机器人按摩控制系统代码解析与应用
- 基于传感器与算法的中医把脉仿真-脉搏数据收集与特征分析的Python实现
- Java应用开发课程实验手册:Java核心技术及Web编程实践
- 基于ANPC与NPC的三电平变换器技术研究:有源中点钳位与三电平逆变器的应用探讨,ANPC,有源中点钳位,NPC,三电平,三电平变器,三电平逆变器 ,核心关键词:ANPC; 有源中点钳位; NPC;
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功