the others as clients realize a big picture is needed
and not just a specific tool or technology. To gain
further insights into the provider landscape, ALM Intelligence provides a unique perspective on provider
peer group analysis by grouping peers based on the
most relevant characteristics that differentiate providers in the cybersecurity market, and not by who
they compete with the most frequently.
For the latest cybersecurity research there are four
peer groups that are segmented by their consulting approach which distinguishes providers’ relative emphasis on improving cybersecurity measures with a closer focus on those who work within the IT function or
those who work more broadly aligning to the enterprise
to support strategic initiatives. These service delivery
models differentiate between providers that focus on
helping their clients improve the operating system of
technologies used to enable cybersecurity measures
versus those that concentrate on the management system for mobilizing and directing resources across the
enterprise to execute the cybersecurity strategy.
For the purposes of this analysis, the four peer groups
break out in the following way:
Business View Providers: In this management peer
group concentrate on identifying cybersecurity implications and priorities based on overall business strategy
and performance, and market trends. There is a strong
focus on understanding the client’s risk tolerance, overall cybersecurity posture, and how these compare to the
industry and more broadly at a global level.
Tools-Oriented Firms: In this group emphasize using
Laura Becker is an Industry Analyst with ALM Intelligence.
tools and solutions to accelerate both the cybersecurity
consulting process and cybersecurity operations. This
group also tends to have focused services around technology trends and cybersecurity, such as Io T.
IT Security Program Providers: In this group tend to
be either pure-play IT security firms or firms with established IT security groups. These firms aim to assess,
design and build every aspect of an IT security program
with an emphasis on integrating threat intelligence.
Function Effectiveness: This group leads from a
functional perspective with the goal of establishing
processes and resources to efficiently integrate and
manage cybersecurity operations.
Source: ALM Intelligence