Answer: Automation and synthetic intelligence are the strategic keys to effective defense against threat development in the virtual world

\n \n \n “. concat(self. i18n. t(‘search. voice. recognition_retry’), “\n

TURIN, Italy, May 30, 2022–(BUSINESS WIRE)–Today, cybersecurity is a key priority in the implementation of new technologies, especially given the very important role they have come to play in our personal and professional lives. Smart homes, connected cars, delivery robots – this evolution will not prevent and therefore it will be necessary, in parallel, to expand automated and AI-based responses to combat the growing number of security threats. The dangers related to such attacks are attributable to several factors, such as increasingly complex and pervasive virtual networks and an increasing sensitivity to knowledge privacy issues. These are the topics that arise from the new studies of “Cybersecurity Automation” carried out through Reply, thanks to the proprietary SONAR platform and that of PAC (Teknowlogy Group) to measure markets and assign their growth.

In particular, the studies estimate the key market trends in the automation of safety formulas, in industry study studies combined with evidence from Reply’s own customers. The knowledge compares two other groups of countries: “Europe-5” (Italy, Germany, France, Netherlands, Belgium) and the “Big 5” (USA). USA, UK, Brazil, China, India) to perceive how new AI responses are being implemented in the ever-changing cyber security landscape.

As cyber attacks such as hacking, phishing, ransomware and malware become more common and sophisticated, resulting in billions of euros in damage to businesses, whether in terms of profits and logo reputation, the adoption of hyper-automation techniques has shown how synthetic intelligence and device learning constitute possible solutions. In addition, those technologies will need to be implemented at each and every level of protection, from software to infrastructure, and from devices to cloud computing.

Of the $300 billion in investments that the global cybersecurity market will make over the next five years, a large portion will be spent on automating security measures for risk detection and reaction times in 4 other segments: application security, endpoint security, security and knowledge protection, Internet of Things security.

Application security. Developers who first brought the concept of “security through design,” an adaptive technique from security to generation design, are now focusing on an even closer collaboration with operations and security teams, called DevSecOps. This new style focuses on integrating security measures into the application progression lifecycle. . Automating testing at every step is very important to reduce the number of vulnerabilities in an application, and many test and research teams additionally integrate AI to increase its accuracy or capabilities. Investments in application security automation in the Europe-5 market are expected to grow enormously, around seven times the existing value, to reach €669 million by 2026. A similar expansion is expected in the Big-5 market, with successful investments of 3500 million euros.

Endpoint security. Endpoints such as desktops, laptops, smartphones and servers are sensitive pieces and therefore conceivable access resources for cyber attacks if they are not well protected. In recent years, the average number of endpoints within a company has increased dramatically, so identifying and adopting effective and comprehensive coverage teams is key to survival. Endpoint Detection and Reaction (EDR) and Extended Detection and Reaction (XDR) are teams created to accelerate reaction time to emerging security risks, by delegating repetitive and monotonous responsibilities to software capable of managing them automatically. more effective way. Investments in such equipment are expected to accumulate in the Europe-5 and Big-5 markets over the next few years, reaching €757 million and €3. 65 billion, respectively. There is also a multitude of other equipment and systems dedicated to incident control that can be incorporated at the business level. For example, in SOAR (Security Orchestration Automation and Response) solutions, AI can be brought to key areas such as risk control or incident reaction.

Security and shielding of knowledge. Data security threats, also known as knowledge breaches, can cause significant harm to a business, leading to legal headaches or damaging logo reputation. Ensuring that knowledge is well preserved and stored is an increasingly vital challenge. It’s easy to believe how many other security threats can come from knowledge mismanagement, cyber attacks, untrusted employees, or even green generation users. Artificial intelligence is a tool to simplify those knowledge security procedures, from discovery to classification and remediation. Security automation is expected to reduce the burden of a knowledge breach by playing a vital role in the other stages of a cyber attack, such as knowledge loss prevention (DLP) tools, encryption, and tokenization. To better protect formula security and knowledge privacy, Europe-5 group corporations are expected to invest €915 million in knowledge security automation by 2026. The Big-5 market will quadruple in value, reaching 4. 4 billion euros in the same period of time.

Security of the Internet of Things. The interconnected nature of IoT allows each and every device on a network to be a potential weak point, meaning a single vulnerability can be enough to shut down an entire infrastructure. By 2026, it is estimated that there will be 80 billion IoT devices on earth. The impressive diversity of functions that are presented through IoT devices for other industries, while enabling smart factories, smart logistics or smart speakers, prevents the creation of a standardized solution for IoT cybersecurity. As IoT networks take off in spaces ranging from healthcare to automotive, the dangers are only multiplying. Therefore, IoT security is one of the most difficult challenges: the line between IT and OT (Operational Technology) will have to be overcome for IoT to unlock its full business value. Therefore, it is estimated that the IoT security automation market will exceed the one billion euro mark in the Europe-5 cluster until 2026. In the Big-5 market, investments will succeed in the tidy sum of 4. 6 bi million euros.

Filippo Rizzante, CTO of Reply, said: “The significant expansion we are seeing in the cybersecurity sector is not due to a trend, but to a need. Every day, cyberattacks hit public and personal services, government and fitness systems, causing great damage. and as a result, it is more pressing than ever to reconsider security methods and succeed in new degrees of maturity through automation, remembering that while synthetic intelligence poses greater risk to the hacker, it is by taking advantage of AI opportunities that cyberattacks can be prevented and countered. “

Full studies can be downloaded here. This news is part of the Reply Market Research series, which includes the reports “From the Cloud to the Edge”, “Industrial IoT: A Truth Check” and “Hybrid Work”.

ReplyReply [EXM, STAR: REY, ISIN: IT0005282865] specializes in the design and implementation of responses based on new communication channels and virtual media. Reply is a network of highly targeted corporations that support Europe’s leading commercial teams operating in the telecommunications and media industry. andArray sectors of banking, insurance and public management in the definition and implementation of business models adapted to the new paradigms of AI, cloud computing, virtual media and Internet of Cosas. La response includes: consulting, systems integration and virtualArraywww. reply. com

See the businesswire. com edition: https://www. businesswire. com/news/home/20220530005087/en/

Contacts

Press Contacts Reply Fabio Zappellif. zappelli@reply. com Tel. 390117711594

Aaron Miania. miani@reply. com Tel. (0)20 7730 6000

Leave a Comment

Your email address will not be published. Required fields are marked *