Using our research, best practices and expertise, we help you understand how to optimize your business processes using applications, information and technology. We provide advisory, education, and assessment services to rapidly identify and prioritize areas for improvement and perform vendor selection
We provide guidance using our market research and expertise to significantly improve your marketing, sales and product efforts. We offer a portfolio of advisory, research, thought leadership and digital education services to help optimize market strategy, planning and execution.
Services for Technology Vendors
We provide guidance using our market research and expertise to significantly improve your marketing, sales and product efforts. We offer a portfolio of advisory, research, thought leadership and digital education services to help optimize market strategy, planning and execution.
The annual RSAC Conference took place in late April in San Francisco, where over 40,000 professionals from the cybersecurity industry converged at the Moscone Center to discuss the latest trends, products and services aimed at threat identification and organizational security.
I last attended the RSAC Conference in 2020, just weeks before the world was instructed to stay home in response to the pandemic. With those restrictions behind us, I eagerly anticipated reconnecting with contacts and forging new relationships. This year’s event was particularly timely as we were in the development of the 2025 ISG Buyers Guides for Cybersecurity when the conference took place. It offered meetings with many of the software providers included in the Buyers Guides.
These Buyers Guides represent the first dedicated evaluations of software providers, building upon ISG's decade-long commitment to producing Industry Provider Lens reports in cybersecurity. The guides cover vital areas such as EDR, IAM, SIEM, and Data Backup and Recovery, evaluating over 55 software providers.
The sectors of Detection and Response and Backup and Recovery are increasingly critical for enterprises. ISG Market Lens research indicates that nearly all organizations experienced a cyber incident in the past year, prompting about one-half of those enterprises to invest in additional cyber protection measures. Relying solely on patching existing systems and erecting barriers is insufficient. While dashboards displaying millions of thwarted breach attempts may appease anxious executives and board members, they fail to address the silent intruder that has infiltrated the defenses. Our research indicates that only 15% of enterprises are actively investing in Detection and Response capabilities in the aftermath of a cyber incident, and fewer than 10% are focusing on recovery strategies. ISG Research asserts that through 2026, 1 in 3 enterprises will respond to a cyber incident by procuring additional protection schema, rather than mitigating enterprise risk by improving the ability to identify potential security incidents. Ultimately, too few enterprises are adopting a proactive security posture. As we know, an attack is inevitable; the question remains: How is exposure mitigated?
The RSAC 2025 Conference progressed the discussion on these pressing issues. Some key themes observed during the event included:
Enterprise security management will become more complex before it improves. As our market assertion suggests, the adoption of cybersecurity software is integral to achieving business goals. While attendance at the RSAC Conference has rebounded to pre-pandemic levels, there was less emphasis on AI technologies among software provider booths than anticipated as we look to the future. To prepare effectively, enterprise IT leaders should prioritize the adoption of proactive security measures, enhance their detection and response capabilities and invest in training programs that align with the latest industry trends showcased at events like the RSAC 2025 Conference.
Regards,
Jeff Orr
Jeff Orr leads the research and advisory for the CIO and digital technology expertise at ISG Software Research, with a focus on modernization and transformation for IT. Jeff’s coverage spans cloud computing, DevOps and platforms, digital security, intelligent automation, ITOps and service management, intelligent automation and observation technologies across the enterprise.
Ventana Research’s Analyst Perspectives are fact-based analysis and guidance on business,
Each is prepared and reviewed in accordance with Ventana Research’s strict standards for accuracy and objectivity and reviewed to ensure it delivers reliable and actionable insights. It is reviewed and edited by research management and is approved by the Chief Research Officer; no individual or organization outside of Ventana Research reviews any Analyst Perspective before it is published. If you have any issue with an Analyst Perspective, please email them to ChiefResearchOfficer@isg-research.net