Cool Vendors in Security Operations and Vulnerability Management, 2018

The products highlighted in this research help security and risk managers prioritize the vulnerabilities in their infrastructure and the security events disclosed via monitoring activities, enabling more effective security investigation and response operations.*

 

* 1. Gartner Cool Vendors in Security Operations and Vulnerability Management, Kelly Kavanagh, Anton Chuvakin, Craig Lawson, Toby Bussa, Pete Shoard, 3 May 2018.
2. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose..
3. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.