Market Map¶
The cybersecurity market is a sprawling, interconnected ecosystem of 14 segments spanning prevention, detection, response, and governance. This page provides a comprehensive visual overview of the entire landscape --- segment sizing, relationships, maturity, and investment dynamics.
Overview¶
The Cybersecurity Market at a Glance
Total estimated market size (2025): ~$290--310 billion across all 14 segments analyzed Projected size (2030): ~$550--600 billion Overall CAGR: ~12--14% Total M&A activity (2025): 426 deals totaling $92.5B in disclosed value Total VC funding (2025): $14B, up 47% from $9.5B in 2024
The cybersecurity market is shaped by three structural forces:
- Platformization --- enterprises running an average of 45 security tools are actively consolidating. Gartner reports 62% of organizations are reducing vendor count, rewarding vendors that absorb adjacent capabilities.
- AI transformation --- both attackers and defenders are adopting AI at scale. AI-generated phishing surged 1,265%+ in 2025, while vendors embed LLMs for autonomous triage, detection, and response.
- Regulatory acceleration --- NIS2, DORA, the EU AI Act, SEC cyber disclosure rules, and CMMC 2.0 are layering new compliance obligations globally, creating non-discretionary demand across GRC, identity, and data security.
For detailed methodology, see Methodology. For key findings, see Key Takeaways.
Market Landscape Diagram¶
The following diagram maps all 14 segments into three tiers --- Core Security Stack, Operational Security, and Specialized Segments --- with data flows showing how telemetry and context move between them.
Sizing Methodology
Market sizes are 2025 estimates drawn from each segment's primary analyst sources (MarketsandMarkets, Mordor Intelligence, Grand View Research, Frost & Sullivan). Some segments have wide estimate ranges due to definitional overlap --- particularly Network Security and GRC, which encompass broad sub-categories. See individual segment pages for detailed sourcing.
Market Size Comparison¶
The table below ranks all 14 segments by estimated 2025 market size, with growth rate and projected 2030 size.
| Rank | Segment | 2025 Size (est.) | CAGR | 2030 Projection | Tier | Fastest Sub-Segment |
|---|---|---|---|---|---|---|
| 1 | Network Security | ~$85B | 7.2% | ~$120B | Core | SASE (~25--29%) |
| 2 | GRC | ~$55B | 13% | ~$128--152B | Ops | Compliance Automation (16.4%) |
| 3 | OT/IoT Security | ~$46B | 24--27% | ~$148B | Specialized | OT Security (23.9%) |
| 4 | MDR & MSSP | ~$41B | 14--24% | ~$79B | Ops | MDR (23.5%) |
| 5 | Cloud Security | ~$36B | 13.3% | ~$75B | Core | CNAPP (28%) |
| 6 | Identity & Access | ~$22B | 14% | ~$42B | Core | ITDR (22.6%) |
| 7 | Endpoint Security | ~$21B | 7% | ~$38B | Core | XDR transition |
| 8 | Vulnerability & ASM | ~$18B | 8--30% | ~$30B | Ops | EASM (28--34%) |
| 9 | Data Security | ~$15B | 17.5% | ~$33B | Specialized | DSPM (fastest, consolidated) |
| 10 | Application Security | ~$14B | 17% | ~$35B | Specialized | ASPM (27.2%) |
| 11 | Threat Intelligence | ~$12B | 14.7% | ~$23B | Specialized | Agentic AI TI |
| 12 | SIEM & SOAR | ~$8B | 14% | ~$19--31B | Ops | Security Data Lake |
| 13 | Email Security | ~$5B | 12.5% | ~$11B | Specialized | ICES (21%) |
| 14 | Security Awareness | ~$5B | 16.8% | ~$15B | Specialized | HRM platforms |
Key Insight: Growth vs. Size
The largest segments (Network Security, GRC) grow at moderate rates (7--13%), while the fastest-growing segments (OT/IoT, CNAPP, EASM, MDR) are smaller but expanding at 20--30%+ CAGR. The highest-growth opportunities cluster in emerging categories within mature segments --- SASE within Network, CNAPP within Cloud, ITDR within Identity, and EASM within Vulnerability Management.
Segment Relationship Map¶
This diagram shows how segments feed into each other functionally --- where data flows, which segments depend on others, and where convergence is occurring.
Convergence Hotspots
The most significant convergence zones in 2025--2026:
- Identity feeds everything --- identity signals flow to endpoint, network, cloud, and SIEM. The Palo Alto/CyberArk deal ($25B) cements identity as a platform pillar.
- SIEM is the analytical hub --- every "producer" segment sends telemetry to SIEM, but XDR platforms are challenging SIEM's central role.
- CNAPP absorbs adjacent categories --- cloud security is consuming CSPM, CWPP, CIEM, DSPM, and pipeline security into unified platforms.
- MDR orchestrates response --- managed detection providers sit downstream of SIEM and execute response across endpoint, network, and identity.
Market Maturity Matrix¶
This quadrant chart plots each segment by market maturity versus growth rate, revealing where the action is.
{
"$schema": "https://vega.github.io/schema/vega-lite/v5.json",
"description": "Market Maturity vs. Growth Rate",
"width": 500,
"height": 400,
"title": {
"text": "Market Maturity vs. Growth Rate",
"fontSize": 16,
"color": "#1B1F3B"
},
"config": {
"background": "transparent",
"axis": {
"labelColor": "#3D4166",
"titleColor": "#1B1F3B",
"gridColor": "#e5e8ee"
},
"text": {
"color": "#1B1F3B"
}
},
"layer": [
{
"mark": {
"type": "text",
"fontSize": 13,
"fontWeight": "bold",
"opacity": 0.15
},
"data": {
"values": [
{
"x": 0.75,
"y": 0.75,
"label": "Mature & Fast-Growing"
},
{
"x": 0.25,
"y": 0.75,
"label": "Emerging & Fast-Growing"
},
{
"x": 0.25,
"y": 0.25,
"label": "Emerging & Slow-Growing"
},
{
"x": 0.75,
"y": 0.25,
"label": "Mature & Slow-Growing"
}
]
},
"encoding": {
"x": {
"field": "x",
"type": "quantitative"
},
"y": {
"field": "y",
"type": "quantitative"
},
"text": {
"field": "label",
"type": "nominal"
},
"color": {
"value": "#1B1F3B"
}
}
},
{
"mark": {
"type": "point",
"size": 150,
"filled": true
},
"data": {
"values": [
{
"x": 0.3,
"y": 0.95,
"label": "OT/IoT Security"
},
{
"x": 0.45,
"y": 0.8,
"label": "Cloud Security (CNAPP)"
},
{
"x": 0.4,
"y": 0.85,
"label": "MDR"
},
{
"x": 0.42,
"y": 0.75,
"label": "Data Security"
},
{
"x": 0.48,
"y": 0.72,
"label": "AppSec"
},
{
"x": 0.55,
"y": 0.7,
"label": "Vulnerability/ASM"
},
{
"x": 0.62,
"y": 0.72,
"label": "Identity & Access"
},
{
"x": 0.55,
"y": 0.68,
"label": "Threat Intelligence"
},
{
"x": 0.6,
"y": 0.65,
"label": "Security Awareness"
},
{
"x": 0.65,
"y": 0.6,
"label": "GRC"
},
{
"x": 0.72,
"y": 0.62,
"label": "SIEM & SOAR"
},
{
"x": 0.78,
"y": 0.55,
"label": "Email Security"
},
{
"x": 0.82,
"y": 0.4,
"label": "Endpoint Security"
},
{
"x": 0.85,
"y": 0.38,
"label": "Network Security"
}
]
},
"encoding": {
"x": {
"field": "x",
"type": "quantitative",
"scale": {
"domain": [
0,
1
]
},
"axis": {
"title": "Emerging \u2192 Mature",
"format": ".0%"
}
},
"y": {
"field": "y",
"type": "quantitative",
"scale": {
"domain": [
0,
1
]
},
"axis": {
"title": "Low Growth \u2192 High Growth",
"format": ".0%"
}
},
"color": {
"value": "#00C9A0"
},
"tooltip": [
{
"field": "label",
"type": "nominal",
"title": "Segment"
},
{
"field": "x",
"type": "quantitative",
"title": "Maturity"
},
{
"field": "y",
"type": "quantitative",
"title": "Growth"
}
]
}
},
{
"mark": {
"type": "text",
"dy": -12,
"fontSize": 11
},
"data": {
"values": [
{
"x": 0.3,
"y": 0.95,
"label": "OT/IoT Security"
},
{
"x": 0.45,
"y": 0.8,
"label": "Cloud Security (CNAPP)"
},
{
"x": 0.4,
"y": 0.85,
"label": "MDR"
},
{
"x": 0.42,
"y": 0.75,
"label": "Data Security"
},
{
"x": 0.48,
"y": 0.72,
"label": "AppSec"
},
{
"x": 0.55,
"y": 0.7,
"label": "Vulnerability/ASM"
},
{
"x": 0.62,
"y": 0.72,
"label": "Identity & Access"
},
{
"x": 0.55,
"y": 0.68,
"label": "Threat Intelligence"
},
{
"x": 0.6,
"y": 0.65,
"label": "Security Awareness"
},
{
"x": 0.65,
"y": 0.6,
"label": "GRC"
},
{
"x": 0.72,
"y": 0.62,
"label": "SIEM & SOAR"
},
{
"x": 0.78,
"y": 0.55,
"label": "Email Security"
},
{
"x": 0.82,
"y": 0.4,
"label": "Endpoint Security"
},
{
"x": 0.85,
"y": 0.38,
"label": "Network Security"
}
]
},
"encoding": {
"x": {
"field": "x",
"type": "quantitative"
},
"y": {
"field": "y",
"type": "quantitative"
},
"text": {
"field": "label",
"type": "nominal"
},
"color": {
"value": "#3D4166"
}
}
},
{
"mark": {
"type": "rule",
"strokeDash": [
4,
4
],
"color": "#6B6F8D"
},
"data": {
"values": [
{
"x": 0.5
}
]
},
"encoding": {
"x": {
"field": "x",
"type": "quantitative"
}
}
},
{
"mark": {
"type": "rule",
"strokeDash": [
4,
4
],
"color": "#6B6F8D"
},
"data": {
"values": [
{
"y": 0.5
}
]
},
"encoding": {
"y": {
"field": "y",
"type": "quantitative"
}
}
}
]
}
Reading the Matrix
- Upper-left (Emerging & Fast-Growing): OT/IoT, MDR, CNAPP, Data Security --- these are the highest-growth investment targets with the most greenfield opportunity.
- Upper-right (Mature & Fast-Growing): Identity, GRC, SIEM --- large markets still growing at 12--14% CAGR due to regulatory tailwinds and platform expansion.
- Lower-right (Mature & Slow-Growing): Endpoint and Network Security --- foundational markets where innovation happens in sub-segments (XDR, SASE) rather than the category overall.
- Lower-left: No segment falls here --- cybersecurity has no low-growth emerging categories in 2025.
Consolidation Indicators¶
Each segment exhibits distinct consolidation dynamics. For the full M&A analysis, see Market Consolidation & M&A Trends.
| Segment | Consolidation Status | Key Signal | Outlook |
|---|---|---|---|
| Endpoint | XDR convergence; mid-tier squeeze (Cybereason, Trellix) | Platform wars between CrowdStrike, Microsoft, Palo Alto | |
| Network | Cisco/Splunk ($28B), HPE/Juniper ($14B), Darktrace take-private ($5.3B) | NDR being absorbed into XDR/platform; SASE vendor shakeout | |
| Cloud | Google/Wiz ($32B); top 5 CNAPP vendors hold 62% revenue | CNAPP is the default model; standalone CSPM/CWPP disappearing | |
| Identity | Palo Alto/CyberArk ($25B); SailPoint IPO ($12.8B) | Identity becoming a platform pillar, not a standalone category | |
| AppSec | PE dominates (Black Duck, Checkmarx, Veracode all PE-owned); ASPM emerging | Roll-up likely; Opengrep fork signals OSS tension | |
| Data | 7 DSPM startups acquired in 18 months; Cyera ($9B) last major independent | DSPM becoming a platform feature; DLP being reinvented | |
| Proofpoint/Hornetsecurity ($1.8B); SEG-to-ICES architectural shift | SAT converging with email security | ||
| SIEM & SOAR | Cisco/Splunk ($28B); Big Three pulling away; SOAR absorbed into SIEM | Security data lake may disintermediate SIEM storage role | |
| GRC | 68 M&A deals in 2024 (highest of any segment); compliance automation boom | Three-tier market: enterprise IRM, mid-market GRC, SMB compliance | |
| OT/IoT | Armis/ServiceNow ($7.75B), Nozomi/Mitsubishi ($1B), Claroty IPO prep | 3 of top 5 vendors in major M&A; IT vendors entering OT | |
| Threat Intel | Mastercard/Recorded Future ($2.65B); Dataminr/ThreatConnect ($290M) | Standalone TI being absorbed into platforms; TI becoming a feature | |
| MDR & MSSP | Sophos/Secureworks ($859M); Zscaler/Red Canary ($675M); 600+ providers | Vendor-led MDR growing fastest; massive shakeout expected by 2027 | |
| Vulnerability & ASM | Tenable/Vulcan Cyber ($147M); Big Three VM vendors hold ~60% share | CTEM framework driving platform expansion; EASM being absorbed | |
| Security Awareness | Vista Equity/KnowBe4 ($4.6B); PE ownership at top of market | Converging with email security; HRM replacing pure SAT |
Consolidation Concentration
Four segments are consolidating so rapidly that the standalone vendor landscape may be unrecognizable by 2028: Cloud Security (CNAPP absorbing everything), Identity (Palo Alto platformization), Data Security (DSPM acquired en masse), and OT/IoT (3 of 5 leaders in M&A). See consolidation analysis for detailed deal tracking.
Investment Heat Map¶
This table ranks segments by investment attractiveness, combining growth rate, market gap density, regulatory tailwinds, and consolidation dynamics.
| Rank | Segment | Growth | Gap Density | Regulatory Tailwind | Consolidation Stage | Investment Signal |
|---|---|---|---|---|---|---|
| 1 | OT/IoT Security | Very High (24%+) | Very High | Strong (NIS2, NERC CIP, TSA) | Active M&A | |
| 2 | Cloud Security | High (13--28%) | High | Strong (SOC 2, FedRAMP) | Rapid consolidation | |
| 3 | Identity & Access | High (14--23%) | High | Very Strong (Zero Trust mandates, DORA) | Rapid consolidation | |
| 4 | Data Security | High (17.5%) | Very High | Very Strong (GDPR, AI Act, CCPA) | DSPM consolidated; AI governance greenfield | |
| 5 | MDR & MSSP | High (14--24%) | High | Moderate (insurance mandates) | 600+ vendors, massive shakeout coming | |
| 6 | Application Security | High (17%) | High | Strong (EU CRA, SBOM mandates) | PE-dominated; ASPM emerging | |
| 7 | Vulnerability & ASM | Moderate-High (8--30%) | Moderate | Strong (CISA KEV, PCI DSS 4.0) | CTEM driving platform expansion | |
| 8 | GRC | Moderate-High (13%) | Moderate | Very Strong (NIS2, DORA, SEC rules) | Highest M&A volume (68 deals in 2024) | |
| 9 | Security Awareness | High (16.8%) | Moderate | Strong (HIPAA, PCI, CMMC, DORA) | Stable; HRM evolution | |
| 10 | Threat Intelligence | Moderate-High (14.7%) | Moderate | Moderate | Standalone TI declining | |
| 11 | SIEM & SOAR | Moderate-High (14%) | Moderate | Strong (SOX, HIPAA log mandates) | Big Three dominance; data lake disruption risk | |
| 12 | Email Security | Moderate (12.5%) | Low-Moderate | Moderate | SEG-to-ICES transition | |
| 13 | Endpoint Security | Moderate (7%) | Low-Moderate | Moderate | Microsoft bundling compresses margins | |
| 14 | Network Security | Moderate (7.2%) | Low | Moderate | Appliance refresh cycles |
Investment Signal Key
Hottest --- high growth, significant gaps, strong regulatory pull, and active M&A creating both opportunities and exit paths Very Attractive / Attractive --- strong fundamentals with clear growth vectors Moderate --- stable demand but either mature or facing consolidation pressure Mature --- large markets but growth comes from sub-segments (SASE, XDR) rather than the category overall
Where the Gaps Are
The highest-density market gaps cluster around three themes, each cutting across multiple segments:
- AI security --- protecting AI agents, governing training data, securing LLM outputs (spans Identity, Data, AppSec, Endpoint)
- SMB underservice --- most segments price out organizations under 500 employees (spans MDR, Cloud, Data, GRC)
- OT/IoT depth --- Purdue Level 1/0 monitoring, IoMT, small utility security (concentrated in OT/IoT but touching SIEM, Vulnerability)
For the full gap analysis, see Underserved Areas.
Cross-References¶
- Segment details: All 14 segments
- Consolidation deep-dive: Market Consolidation & M&A Trends
- Underserved areas: Gaps & Underserved Markets
- Emerging technologies: Emerging Technology Trends
- Practitioner pain points: Pain Points & Complaints
- Regulatory landscape: Compliance & Regulatory Analysis
Glossary¶
This glossary defines the acronyms and key terms used throughout the cybersecurity market research site. Use it as a quick reference when navigating segment analyses, pain-point discussions, and opportunity assessments.
A¶
| Term | Definition |
|---|---|
| ACL | Access Control List — rules determining which users/systems can access resources |
| APT | Advanced Persistent Threat — a prolonged, targeted cyberattack where an intruder gains and maintains unauthorized access |
| ASM | Attack Surface Management — continuous discovery, inventory, and risk assessment of an organization's external-facing assets |
| ASPM | Application Security Posture Management — unified visibility and risk management across the application lifecycle |
| AV | Antivirus — software designed to detect, prevent, and remove malware |
B¶
| Term | Definition |
|---|---|
| BAS | Breach and Attack Simulation — automated tools that simulate real-world attacks to test security controls |
| BEC | Business Email Compromise — a social-engineering attack targeting employees with access to company finances or data |
C¶
| Term | Definition |
|---|---|
| C2 | Command and Control — infrastructure used by attackers to communicate with compromised systems |
| CASB | Cloud Access Security Broker — a security policy enforcement point between cloud consumers and providers |
| CCPA | California Consumer Privacy Act — California state law granting consumers rights over their personal data |
| CIAM | Customer Identity and Access Management — managing and securing external customer identities and authentication |
| CIEM | Cloud Infrastructure Entitlement Management — managing identities and privileges in cloud environments |
| CTEM | Continuous Threat Exposure Management — a program for continuously assessing and prioritizing threat exposures |
| CNAPP | Cloud-Native Application Protection Platform — integrated security for cloud-native applications across the full lifecycle |
| CSPM | Cloud Security Posture Management — continuous monitoring of cloud infrastructure for misconfigurations and compliance risks |
| CWPP | Cloud Workload Protection Platform — security for workloads running in cloud environments (VMs, containers, serverless) |
| CVE | Common Vulnerabilities and Exposures — a standardized identifier for publicly known cybersecurity vulnerabilities |
D¶
| Term | Definition |
|---|---|
| DAST | Dynamic Application Security Testing — testing a running application for vulnerabilities by simulating attacks |
| DCS | Distributed Control System — a control system for managing industrial processes across multiple locations |
| DLP | Data Loss Prevention — tools and processes to prevent unauthorized data exfiltration or leakage |
| DORA | Digital Operational Resilience Act — EU regulation on ICT risk management for financial entities |
| DSPM | Data Security Posture Management — discovering, classifying, and protecting sensitive data across cloud environments |
E¶
| Term | Definition |
|---|---|
| EASM | External Attack Surface Management — discovering and monitoring internet-facing assets for exposures |
| EDR | Endpoint Detection and Response — tools that monitor endpoints for threats and provide investigation and response capabilities |
| EPP | Endpoint Protection Platform — integrated endpoint security combining prevention, detection, and response |
F/G¶
| Term | Definition |
|---|---|
| FAIR | Factor Analysis of Information Risk — a quantitative model for understanding, analyzing, and measuring information risk |
| GRC | Governance, Risk, and Compliance — integrated framework for aligning IT with business goals, managing risk, and meeting regulations |
| GDPR | General Data Protection Regulation — EU regulation on data protection and privacy for individuals |
H¶
| Term | Definition |
|---|---|
| HIPAA | Health Insurance Portability and Accountability Act — US law governing the privacy and security of health information |
I¶
| Term | Definition |
|---|---|
| IAB | Initial Access Broker — specialized cybercriminals who compromise networks and sell access to ransomware operators and other buyers |
| IAM | Identity and Access Management — framework for managing digital identities and controlling access to resources |
| ICS | Industrial Control System — control systems used in industrial production and critical infrastructure |
| IDS | Intrusion Detection System — a system that monitors network traffic for suspicious activity and alerts |
| ITDR | Identity Threat Detection and Response — detecting and responding to identity-based attacks and compromises |
| IoT | Internet of Things — network of physical devices embedded with sensors, software, and connectivity |
| IPS | Intrusion Prevention System — a system that monitors and actively blocks detected threats in network traffic |
L¶
| Term | Definition |
|---|---|
| LOTL | Living Off the Land — attack technique using legitimate, pre-installed system tools and binaries rather than custom malware to evade detection |
M¶
| Term | Definition |
|---|---|
| MaaS | Malware-as-a-Service — cybercrime business model where malware developers sell or rent their tools to other criminals |
| MDR | Managed Detection and Response — outsourced security service providing 24/7 threat monitoring, detection, and response |
| MITRE ATT&CK | MITRE Adversarial Tactics, Techniques, and Common Knowledge — a knowledge base of adversary behaviors and techniques |
| MSSP | Managed Security Service Provider — a third-party provider offering outsourced monitoring and management of security devices |
| MFA | Multi-Factor Authentication — requiring two or more verification factors to gain access to a resource |
N¶
| Term | Definition |
|---|---|
| NDR | Network Detection and Response — detecting and responding to threats by analyzing network traffic patterns |
| NERC CIP | North American Electric Reliability Corporation Critical Infrastructure Protection — security standards for the electric grid |
| NGAV | Next-Generation Antivirus — advanced antivirus using behavioral analysis, AI, and machine learning beyond signature-based detection |
| NIS2 | Network and Information Systems Directive 2 — updated EU directive on cybersecurity for essential and important entities |
| NIST CSF | National Institute of Standards and Technology Cybersecurity Framework — a voluntary framework for managing cybersecurity risk |
O¶
| Term | Definition |
|---|---|
| OT | Operational Technology — hardware and software that monitors and controls physical devices and processes |
| OWASP | Open Worldwide Application Security Project — a nonprofit focused on improving software security through open-source projects and guidance |
P¶
| Term | Definition |
|---|---|
| PAM | Privileged Access Management — securing, managing, and monitoring privileged accounts and access |
| PCI DSS | Payment Card Industry Data Security Standard — security standards for organizations that handle credit card data |
| PII | Personally Identifiable Information — any data that could identify a specific individual |
| PLC | Programmable Logic Controller — an industrial computer used to control manufacturing processes |
R¶
| Term | Definition |
|---|---|
| RaaS | Ransomware-as-a-Service — cybercrime business model where ransomware operators provide malware and infrastructure to affiliates who conduct attacks, splitting profits |
| RGB | Reconnaissance General Bureau — North Korea's primary intelligence agency responsible for clandestine operations including cyber operations |
S¶
| Term | Definition |
|---|---|
| SASE | Secure Access Service Edge — converged network and security-as-a-service architecture delivered from the cloud |
| SAST | Static Application Security Testing — analyzing source code for vulnerabilities without executing the application |
| SBOM | Software Bill of Materials — a formal inventory of components, libraries, and dependencies in a software product |
| SCA | Software Composition Analysis — identifying open-source components and known vulnerabilities in a codebase |
| SCADA | Supervisory Control and Data Acquisition — a system for monitoring and controlling industrial processes remotely |
| SD-WAN | Software-Defined Wide Area Network — a virtual WAN architecture that simplifies branch networking and optimizes traffic |
| SEG | Secure Email Gateway — a solution that filters inbound and outbound email to block threats and enforce policies |
| SIEM | Security Information and Event Management — aggregating and analyzing log data for threat detection and compliance |
| SOAR | Security Orchestration, Automation, and Response — tools that automate and coordinate security operations workflows |
| SOC | Security Operations Center — a centralized team and facility for monitoring, detecting, and responding to security incidents |
| SOX | Sarbanes-Oxley Act — US law mandating financial reporting and internal control requirements for public companies |
| SSE | Security Service Edge — the security component of SASE, delivering SWG, CASB, and ZTNA as cloud services |
| SWG | Secure Web Gateway — a solution that filters web traffic to enforce security policies and block threats |
T¶
| Term | Definition |
|---|---|
| TAM | Total Addressable Market — the total revenue opportunity available for a product or service |
| TCO | Total Cost of Ownership — the complete cost of acquiring, deploying, and operating a solution over its lifetime |
| TIP | Threat Intelligence Platform — a system for aggregating, correlating, and operationalizing threat intelligence data |
| TLS | Transport Layer Security — a cryptographic protocol that provides secure communication over a network |
| TTP | Tactics, Techniques, and Procedures — the patterns of behavior and methods used by threat actors to conduct cyber operations |
V¶
| Term | Definition |
|---|---|
| VM | Vulnerability Management — the ongoing process of identifying, evaluating, treating, and reporting security vulnerabilities |
X¶
| Term | Definition |
|---|---|
| XDR | Extended Detection and Response — unified threat detection and response across endpoints, network, cloud, and email |
Z¶
| Term | Definition |
|---|---|
| ZTNA | Zero Trust Network Access — a security model that grants access based on identity verification and least-privilege principles |