

Client: Enigma Marketing Pte Ltd
Format: Report
Size: 657 KB
Language: English
Date: 18.02.2025
The Future of Network Security Technology: A SANS Survey
A myriad of factors can influence the dynamics of an organization’s security team and their respective spending patterns.
- What drives organizations to spend and allocate resources the way they do?
- Is it the looming shadow of various security risk factors, stringent requirements of compliance, or the ever-evolving landscape of threats?
- How does one even go about sorting their risks and priorities?
Another consideration when it comes to tooling and resource utilization is that although security teams often have significant purview, they are not the only teams requiring insight into an organization. Network engineers and IT operations are critical to uptime and business processes and often drive their own spend—if not spend that is integrated with security needs.
In this survey, we set out to understand how the various driving forces in the industry, ranging from organizational needs to insider threats to third-party access, can impact the confidence and acquisition of various security tools or approaches.