IDC's Cloud Native XDR and Artificial Intelligence Security Analytics covers the evolution of extended detection and response (XDR), the role of artificial intelligence (AI) in cybersecurity platforms, and the tools and processes required to uplevel the role of tier 1 security operation center (SOC) analysts into more proactive roles in threat hunting and mitigation in software. A representative mix of technologies that comprise SOC analytics includes SOAR, network intelligence and threat analytics (NITA), deception, threat intelligence platforms and security services (TIP/TISS) adversary tools, process dump tools, sandboxing/reversing tools, and Windows/OSX/Linux evidence collection. This research is the advanced analytics companion to IDC's cybersecurity security information and event management (SIEM) and security and vulnerability management (SVM) market, which focuses on SIEM, SVM, and attack surface management tools.
Cloud Native XDR and Artificial Intelligence Security Analytics
Related Links
Meet the Experts
Markets and Subjects Analyzed
- Network intelligence and threat analytics
- Cloud-native XDR (non-endpoint based)
- Threat intelligence platforms and security services
- SOAR
- Firewall automation
- Generative AI in SOC processes
Core Research
- SOC 2 Analyst Survey
- Tier 2 Analytics Market Glance
- Effects of GenAI in Detection and Response
- IDC Market Analysis Perspective
- Cloud-Native XDR, NITA, SOAR, and Threat Intelligence Market Share and Forecast
In addition to the insight provided in this service, IDC may conduct research on specific topics or emerging market segments via research offerings that require additional IDC funding and client investment.
Key Questions Answered
- What is the size and market opportunity for tier 2 security analytics solutions?
- Which is the architecture of XDR?
- What is the size and market opportunity for advanced security orchestration solutions?
- What is the size and market opportunity for NDR solutions?
- How has the competitive landscape changed through digital transformation and adoption of cloud and enabling technologies?
- What role will generative AI play in creating advantages for SOC analysts, and what roles may be replaced or subsumed?
Companies Covered
- AT&T Inc.
- Accenture plc
- Alert Logic, Inc.
- AlgoSec Inc.
- Amazon Web Services Inc.
- Anomali Inc.
- Arista Networks, Inc.
- BitDefender Srl
- Booz Allen Hamilton Inc.
- Broadcom Inc.
- Bugcrowd Inc.
- Checkmarx Ltd.
- Checkpoint Systems, Inc.
- Cisco Systems Inc.
- CrowdStrike, Inc.
- Cyber Hunters Ltd.
- Cybersixgill Inc
- Darktrace Ltd.
- Dazz
- Dell Technologies Inc.
- ESET spol. s r.o.
- Elastic NV
- Exabeam Inc.
- ExtraHop Networks, Inc.
- Flashpoint Technology Inc
- Forcepoint LLC
- Fortinet, Inc.
- Fortra LLC
- Gigamon Inc.
- Google LLC
- Gurucul Solutions LLC
- HCL Technologies Limited
- HelpSystems LLC
- IBM
- Infoblox Inc.
- Intel Corporation
- Intel471 Inc.
- Kaseya Inc.
- LevelBlue
- LogRhythm, Inc.
- LookingGlass Cyber Solutions, Inc.
- Lumen Technologies
- Mandiant Inc.
- McAfee LLC
- MetricStream, Inc.
- Micro Focus International plc
- Microsoft Corporation
- MixMode Inc.
- NETSCOUT Systems, Inc.
- NIKSUN Inc.
- NSFOCUS Technologies Co. Ltd.
- NetWitness Corp.
- Netenrich Inc.
- NortonLifeLock Inc.
- Nudge Security Inc
- OpenText Corporation
- Oracle Corporation
- Palo Alto Networks, Inc.
- Plixer, LLC
- PricewaterhouseCoopers LLP
- Qualys Inc.
- Rapid7 LLC
- Recorded Future Inc.
- ReversingLabs, Inc.
- Riverbed Technology, Inc.
- SecureWorks Inc.
- SecurityScorecard, Inc.
- Semperis Ltd.
- SentinelOne, Inc.
- ServiceNow, Inc.
- Skybox Security, Inc.
- Sophos Plc
- Splunk Inc.
- Sumo Logic, Inc.
- Swimlane LLC
- Tanium Inc.
- Tenable, Inc.
- Tencent Holdings Limited
- ThreatConnect Inc.
- Tines Security Services Ltd.
- Torq Technologies Ltd.
- Trellix Corp.
- Trend Micro Incorporated
- Trustwave Holdings Inc.
- Tufin Software Technologies Ltd.
- VMware, Inc.
- Vectra Networks Inc.
- Venustech Group Inc.
- ZeroFox, Inc.
- Zoho Corporation Pvt. Ltd.