Filters
Clear Filters
Reset all filters
No results found
Content Type
Accelerator
(1)
Blog
(12)
Event
(2)
Executive Briefs
(1)
LinkedIn Live
(1)
Market Insights™
(1)
PEAK Matrix®
(15)
Press Release
(1)
Provider Compendium
(12)
Provider Recognition
(1)
State of the Market
(5)
Tech Launch Perspective
(7)
Thematic Report
(6)
Viewpoint
(4)
Voice of the Customer
(1)
Webinar
(1)
Webinar Deck
(3)
No results found
Topics
AdTech
(1)
Agentic AI
(3)
AIOps
(1)
Artificial intelligence (AI)
(2)
Australia/New Zealand
(3)
Benchmarking
(1)
Business continuity planning (BCP)/disaster recovery (DR)
(1)
Business Process Outsourcing (BPO)
(1)
Central & Eastern Europe
(5)
Central America & Caribbean
(1)
Cloud computing
(6)
Cloud security
(18)
Customer experience management (CXM)
(1)
Cyber risk
(4)
Cybersecurity
(67)
Data security & privacy
(5)
East Asia
(2)
End-user computing
(1)
Endpoint security management
(7)
Engineering
(1)
Generative AI (GenAI)
(11)
Global Business Services (GBS)
(1)
Global Capability Center (GCC)
(1)
Human Resources (HR)
(1)
Hyperscaler
(13)
Identify & access management (IAM)
(8)
India
(1)
Internet of Things (IoT)
(1)
IT infrastructure
(1)
IT operations
(2)
Managed Services
(4)
Master Data Management (MDM)
(1)
Mergers & acquisitions (M&A) and divestitures
(3)
Mid-market
(1)
North America
(5)
Operational risk audits & controls
(1)
Outsourcing
(3)
Pricing
(3)
Process automation platforms
(1)
Quantum computing
(2)
Quantum cybersecurity
(3)
Responsible AI
(1)
Skills
(1)
Southeast Asia
(2)
Specialists
(2)
Strategic sourcing
(1)
Systems integration (SI)
(12)
Third-party risk management (TPRM)
(1)
Western Europe
(6)
Work from Home (WFH)
(1)
No results found
Companies & Technologies
Accenture
(19)
Akamai Technologies
(1)
Amazon Web Services (AWS)
(1)
Arctic Wolf
(3)
Armis
(1)
AT&T
(6)
Atos
(13)
BeyondTrust
(1)
Birlasoft
(3)
BlueVoyant
(2)
Brillio
(2)
Broadcom
(2)
BT Global Services
(2)
Capgemini
(17)
Cato Networks
(1)
CGI
(2)
Check Point
(2)
Cisco
(2)
Citrix
(1)
Cloudreach
(4)
Coforge
(4)
Cognizant
(17)
Computacenter
(4)
CrowdStrike
(3)
CSS Corp
(2)
CyberArk
(1)
Darktrace
(1)
Datadog
(1)
Deloitte
(18)
DXC Technology
(19)
EPAM
(2)
eSentire
(2)
ESET
(1)
Expel
(2)
EY
(5)
F5 Inc.
(1)
FIS
(1)
Forescout
(1)
Fortinet
(2)
Fortra
(2)
Fujitsu
(11)
GAVS Technologies
(7)
Gen Digital
(1)
Genpact
(2)
GFT
(4)
Google
(3)
Happiest Minds
(11)
Harman DTS
(1)
HCLTech
(8)
Hitachi Digital Services
(1)
IBM
(21)
Infosys
(17)
Inspira
(1)
Ivanti
(1)
Juniper Networks
(1)
Kaspersky Lab
(1)
KPMG
(4)
Lancesoft
(1)
LTI
(13)
Microland
(14)
Microsoft
(1)
Microsoft Azure
(1)
Mimecast
(1)
Mindtree
(11)
Mphasis
(12)
NTT DATA
(19)
Okta
(1)
OneTrust
(1)
OpenText
(1)
Oracle
(1)
Orange Business Services
(2)
Palo Alto Networks
(3)
Persistent Systems
(2)
Ping Identity
(1)
Proofpoint
(1)
PwC
(6)
Qualys
(1)
Rackspace Technology
(1)
Rapid7
(3)
Red Canary
(2)
RSA Security
(1)
Rubrik
(1)
SailPoint
(1)
SecureWorks
(2)
SentinelOne
(2)
ServiceNow
(1)
Sophos
(2)
Sopra Steria
(4)
Stefanini
(9)
T-Systems
(8)
Tanium
(1)
Tata Communications
(8)
TCS
(18)
Tech Mahindra
(18)
Telefonica
(5)
Tenable
(1)
Thales Group
(1)
Trellix
(1)
Trend Micro
(1)
Unisys
(6)
UST
(4)
Varonis
(1)
Verizon
(2)
Virtusa
(4)
Wipro
(19)
Zensar
(15)
Zoho Creator
(1)
Zscaler
(1)
No results found
Membership
Advanced SciTech
Agentic and Process Automation
Amazon Web Services (AWS)
Application Services
Artificial Intelligence (AI)
Banking and Financial Services IT
Cloud and Infrastructure Services
Contingent Staffing
CX Excellence
Cybersecurity
Cybersecurity Tech
Data and Analytics
Digital Services
Digital Workplace
Engineering Research and Development
Enterprise Platform Services
Everest Group Strategic Access | Consulting
Everest Group Strategic Access | Investor
Financial Crime and Compliance
GBS and GCC
Google Cloud
Healthcare IT
Healthcare Provider
Healthcare Provider Intelligent Operations
HealthTech
Insurance Intelligent Operations
Insurance IT
Insurance Technology (InsurTech)
Life Sciences IT
Locations Insider™
Marketing and Sales Services and Technology
Microsoft Azure
Modern Application Development (MAD)
Outsourcing Excellence
Pricing Analytics as a Service
Procurement and Supply Chain
ProcureTech
R&D Executive Membership
Retail and CPG
Retirement Technologies
Software Engineering
Sustainability Technology and Services
No results found
Contributors
Aaditya Jain
(5)
Aakash Verma (RCPG)
(1)
Aastha Chakrawarty
(23)
Abhigyan Kumar
(3)
Abhilasha Sharma
(1)
Abhimanyu Awasthi
(1)
Abhishek A.K.
(1)
Abhishek Biswas
(1)
Abhishek Mundra
(6)
Abhishek Sengupta
(1)
Abhishek Sharma
(4)
Abhishek Singh
(21)
Achint Arora
(5)
Aditi Prakash
(1)
Aditya Pawar
(1)
Ahmad Khan
(1)
Akshat Vaid
(2)
Alisha Mittal
(8)
Amala Varsheni KK
(1)
Amardeep Modi
(1)
Amit Anand
(3)
Amit Lad
(3)
Amy Fong
(6)
Anish Agarwal
(1)
Anish Nath
(3)
Anju Kattakathu
(1)
Ankit Gupta
(3)
Ankita Upadhyay
(1)
Anmol Shrivastava
(3)
Anushka Sharma
(5)
Archit Mishra
(1)
Arjun Chauhan
(50)
Arpita Dwivedi
(3)
Arun Prateek
(1)
AS Yamohiadeen
(2)
Ashish Sehdev
(0)
Ashwin Venkatesan
(32)
Asritha Gantla
(4)
Aurindum Mukherjee
(1)
Ayan Pandey
(1)
Barbara Beller
(2)
Bhanushee Malhotra
(4)
Bharanidharan SP
(18)
Bhavyaa Kukreti
(1)
Chinmay Joshi
(1)
Chinmay Pathak
(7)
Chunky Satija
(5)
CJ Sengupta
(25)
Deepti Sekhri
(24)
Dev Gaba
(0)
Devjeet Rath
(2)
Dheeraj Maken
(1)
Divya Chandak
(3)
Divyam Jain
(1)
Durga Ambati
(2)
Everest Group
(12)
Faisal Arfeen
(1)
Gautam Goel
(6)
Harshita Singh (EIT)
(5)
Himanshu Mhatre
(1)
Hrishi Raj Agarwalla
(1)
Isaac Premsingh
(4)
Jillian Walker
(4)
Jimit Arora
(16)
Kaashyap Sarma
(1)
Kalyani Devrukhkar
(2)
Kanika Gupta
(1)
Kasthuri Jagadeesan
(4)
Kaustubh K
(26)
Keshav R
(1)
Kriti Gupta
(8)
Kriti Seth
(2)
Kumar Avijit
(73)
Kumar Dhwanit
(1)
Kunal Anand
(1)
Lalith Kumar
(4)
Laqshay Gupta
(6)
Lochan Surana
(1)
Madhurima Chopra
(3)
Malsawmkima Sailung
(4)
Mansi Gupta
(1)
Manu Aggarwal
(1)
Matthew Corsi
(1)
Mayank Maria
(1)
Mehul Khera
(2)
Mohammed Riyaz
(2)
Mohit Singhal
(3)
Mukesh Ranjan
(73)
Nabeel Bhattacharya
(1)
Neeraj Sasheendran
(3)
Nisarg Shah
(1)
Nisha Krishan
(1)
Nishant Udupa
(1)
Nishit Meswani
(1)
Nithya S
(4)
Nitish Mittal
(12)
Oishi Mazumder
(1)
Pallavi Seth
(4)
Paras Chugh
(1)
Parul Trivedi
(1)
Peter Bendor-Samuel
(4)
Prabhjyot Kaur
(20)
Prabhneet Kaur
(1)
Praharsh Srivastava
(20)
Prakhar Saxena
(1)
Pranati Dave
(5)
Prateek Gupta
(1)
Priya Sahni
(2)
Rachita Mehrishi
(1)
Rachita Rao
(8)
Rahul Gehani
(4)
Rakshit Gupta
(6)
Rashi Garg
(10)
Ravi Varun
(1)
Raya Mukherjee
(3)
Richa Tapadia
(2)
Richard Sear
(3)
Ricky Sundrani
(23)
Rita N. Soni
(1)
Riya Munjal
(3)
Rod Bourgeois
(10)
Rohan Pant
(2)
Rohit
(8)
Rohit K
(8)
Roma Juneja
(1)
Ronak Doshi
(19)
Rugved Sawant
(1)
Rushil Goel
(1)
Saikat Roy
(3)
Saket S
(1)
Sakshi Garg
(1)
Sakshi Nigam
(2)
Sangamesh Kadagad
(2)
Sarmista Priyadarshini
(1)
Sarweshwer Gupta
(9)
Satyajit Roy
(1)
Sharang Sharma
(1)
Shikharjit Mitra
(1)
Shivam Naidu
(9)
Shivraj Borade
(13)
Shrey Kalawatia
(1)
Shrish Shekhar
(1)
Shubham Yadav
(1)
Siddharth Rawat
(2)
Snigdha Uppala
(1)
Sonal Singh
(2)
Subramanya S Bettadapura
(1)
Supratim Nandi
(3)
Supriya Rajpal
(2)
Sushree Acharya
(7)
Tanisha Pacheriwala
(1)
Tanvi Rai
(5)
Tista Guha
(1)
Titus M
(15)
Udit Maheshwari
(1)
Udit Singh
(7)
Uthra K
(1)
Vaibhav Bansal
(3)
Vamsi Krishna
(2)
Vanshika Notani
(3)
Varnit Tyagi
(1)
Vigitesh Tewary
(3)
Vinamra Shukla
(4)
Vinisha Choudhary
(1)
Vudikala Pramodh
(3)
Vyom Nagaich
(19)
Yugal Joshi
(50)
Zachariah K Chirayil
(57)
No results found
-
Recent narratives around Mythos have triggered a familiar reaction, concern that enterprise environments are fundamentally broken. That conclusion misses the point. These newer cybersecurity -focused models are not introducing a new class of threats. They are exposing, at scale, what many security leaders…
-
Blog April 07, 2026
RSA Conference 2026: the future arrived faster than security was ready for
RSA Conference (RSAC) 2026 made one thing clear: Cybersecurity is no longer evolving in a steady, predictable manner. It is being reshaped in bursts, driven by Artificial Intelligence (AI), shifting identity paradigms, and the growing urgency of resilience. What stood out this year was not just… -
Blog March 18, 2026
Cybersecurity services outlook for 2026 - from evolution to reinvention
The cybersecurity services market is entering a decisive phase in 2026. What was once a scale-driven, compliance-heavy, and reactive industry is now being reshaped by intelligence, distribution of buying power, and structural shifts in delivery and monetization. Three… -
Blog Feb. 04, 2026
Everest Group Cybersecurity Top 50™ 2025: mapping the leaders shaping global digital resilience
As digital ecosystems expand and threat actors grow increasingly sophisticated, cybersecurity has evolved from a technical safeguard into a strategic business priority. Cloud-first architectures, AI-enabled operations, and increasingly interconnected enterprise environments have dramatically expanded the attack… -
Press Release Feb. 04, 2026
Everest Group announces inaugural Cybersecurity Top 50™ 2025 ranking
As enterprises accelerate digital transformation amid expanding attack surfaces, rising regulatory scrutiny, and increasingly sophisticated threat actors, cybersecurity has moved decisively from an IT function to a board-level strategic priority. Against this backdrop, Everest Group today announced the… -
Provider Recognition Jan. 15, 2026
Cybersecurity Top 50™ 2025
What is the Everest Group Cybersecurity Top 50™ 2025? The Everest Group Cybersecurity Top 50™ 2025 is a global list of the 50 largest and most influential cybersecurity technology providers, based on their cybersecurity revenues, Year-on-Year… -
The enterprise software landscape witnessed a seismic shift in December 2025 as ServiceNow announced its agreement to acquire cybersecurity leader Armis for approximately $7.75 billion. This transaction represents ServiceNow’s largest acquisition to date and marks a definitive evolution for a company that began…
-
Provider Compendium Nov. 14, 2025
Cybersecurity Services for Mid-market Enterprises – Provider Compendium 2025
The growing digital dependence of mid-market enterprises has accelerated their need for comprehensive cybersecurity services that are modular, consumption-based, and easy to integrate. With expanding attack surfaces due to cloud adoption, remote work, and IoT connectivity,… -
PEAK Matrix® Oct. 09, 2025
Identity and Access Management (IAM) Services PEAK Matrix® Assessment 2025
Hybrid-multi cloud architectures, an explosion of API and machine identities, and tightening global regulations have made Identity and Access Management (IAM) the keystone of zero-trust security. Beyond familiar challenges such as joiner-mover-leaver management, organizations now confront… -
PEAK Matrix® Oct. 03, 2025
Cybersecurity Services for Mid-market Enterprises PEAK Matrix® Assessment 2025
Cybersecurity has become a board-level priority for mid-market enterprises as they accelerate digital adoption. Organizations in the US$1-5 billion revenue range are increasingly moving workloads to cloud and SaaS platforms, deploying IoT devices, and enabling hybrid… -
LinkedIn Live Sep. 17, 2025
The Future of MDR: AI, Metrics, and Market Forces
Managed Detection and Response (MDR) is fast becoming the core of enterprise cybersecurity strategy. Threats are growing more complex and businesses face increasing operational and reputational risks, making faster, more intelligent, and value-focused MDR solutions key… -
Provider Compendium Aug. 14, 2025
Managed Detection and Response (MDR) Services Specialists – Provider Compendium 2025
A surge in cloud workloads, IoT deployments, and IT-OT integration is reshaping the cybersecurity landscape, leaving enterprises vulnerable to advanced threats and operational inefficiencies. With limited in-house resources, many security teams are turning to specialist Managed… -
Tech Launch Perspective Aug. 08, 2025
Cybersecurity – Review of Palo Alto Networks’ Product Announcements at RSAC 2025
Palo Alto Networks’ announcements at the RSA Conference (RSAC) 2025 reflect a strong commitment to AI-driven security and platform unification, offering enterprises enhanced threat detection and posture management. Key updates and launches fall into three strategic… -
July 28, 2025
Reshaping the MDR Market: How Strategic Acquisitions Drive New Cybersecurity Capabilities | Blog
The dawn of a new era in the MDR market The cybersecurity industry is undergoing significant transformation marked by strategic acquisitions, reshaping the Managed Detection and Response (MDR) market. Zscaler’s acquisition of Red Canary and Sophos… -
Tech Launch Perspective July 22, 2025
Cybersecurity – Review of Google Cloud’s Product Announcements at RSAC 2025
Google Cloud’s announcements at the RSA Conference (RSAC) 2025 advance its unified, intelligence‑centric cyber defense vision. Key updates fall into four strategic pillars: AI‑powered security operations – Gemini AI agents are embedded in the Security Operations… -
Tech Launch Perspective July 22, 2025
Cybersecurity – Review of CrowdStrike’s Product Announcements at RSAC 2025
CrowdStrike used the RSA Conference (RSAC) 2025 to reinforce its unified, intelligence‑led cyber defense vision. The provider’s portfolio enhancements spanned four strategic pillars: Agentic AI for the Security Operations Centre (SOC) – Charlotte AI autonomously triages… -
Tech Launch Perspective June 30, 2025
Cybersecurity – Review of SentinelOne’s Product Launch Announcements at RSAC 2025
In this report, we assess SentinelOne’s evolving cybersecurity portfolio, emphasizing the strategic innovations showcased at the RSA Conference (RSAC) 2025. SentinelOne introduced Purple AI Athena, an agentic AI that autonomously triages, investigates, and remediates security incidents. It… -
Viewpoint June 27, 2025
Generative AI in Action: Transforming Security Operations Centers (SOCs) for Modern Cyber Defense
Gen AI is transforming how SOCs detect, respond to, and manage cyber threats. It enables automating repetitive tasks such as log analysis, alert triage, and incident investigation – freeing analysts to focus on strategic threat hunting… -
PEAK Matrix® June 27, 2025
Managed Detection and Response (MDR) Services Specialists PEAK Matrix® Assessment 2025
As enterprise IT ecosystems grow more complex with hybrid environments, expanding threat surfaces, and an urgent need for faster threat response, organizations are partnering with specialist Managed Detection and Response (MDR) providers for highly tuned and… -
Voice of the Customer June 26, 2025
Cyber Threat Detection and Response (CTDR): Voice of the Customer 2025
With rapid digitization expanding the attack surface, the rise in sophisticated and state-sponsored cyber threats, and intensifying regulatory scrutiny on breach monitoring and reporting, demand for comprehensive Cyber Threat Detection and Response (CTDR) solutions continues to…
Items per page