www.extrahop.com Open in urlscan Pro
54.214.40.190  Public Scan

Submitted URL: http://groove.ehlinks.com/url/Ag_sxTp2qtnhnvt4ToiNU5GOHR0/aHR0cHM6Ly93d3cuZXh0cmFob3AuY29tL2NvbXBhbnkvYmxvZy8yMDIyL3RvcC1j...
Effective URL: https://www.extrahop.com/company/blog/2022/top-cybersecurity-trends-for-2023-strategies-integrations-and-budgets/
Submission: On August 31 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

Name: untitledForm-1367515949663POST https://s1701.t.eloqua.com/e/f2

<form method="POST" id="form107" name="untitledForm-1367515949663" role="form" action="https://s1701.t.eloqua.com/e/f2" class="reset-disabled" data-parsley-validate="" data-parsley-trigger="focusout" data-onload="extrahop.undisableForm"
  novalidate="">
  <input type="hidden" name="elqFormName" value="untitledForm-1367515949663">
  <input type="hidden" name="elqSiteId" value="1701">
  <input type="hidden" name="elqCampaignId">
  <input type="hidden" name="campaignId" value="70180000001EqjnAAC">
  <input type="hidden" name="elqCustomerGUID">
  <input type="hidden" name="elqCookieWrite" value="0">
  <input type="hidden" name="GA_Medium" value="">
  <input type="hidden" name="GA_Source" value="">
  <input type="hidden" name="GA_Campaign" value="">
  <input type="hidden" name="GA_Content" value="">
  <input type="hidden" name="GA_Term" value="">
  <input type="hidden" name="GA_Product" value="">
  <input type="hidden" name="GA_Region" value="">
  <input type="hidden" name="GA_Funnelstage" value="">
  <input type="hidden" name="GA_Version" value="">
  <input type="hidden" name="gclid" value="">
  <input type="hidden" name="FormURL" value="">
  <input type="hidden" name="uniqueid" value="">
  <input type="hidden" name="GA_Adgroup" value="">
  <input type="hidden" name="redirectUrl" value="https://www.extrahop.com/company/newsletter-signup-success/" data-sync-host="www">
  <div class="inline-input">
    <div class="form-group email">
      <input id="email" class="form-control garlic-auto-save" name="email" type="email" required="" placeholder="Email Address">
    </div>
    <div class="form-group">
      <input type="submit" class="btn btn-basic btn-green" value="Subscribe" data-track-newsletter-subscribe="">
    </div>
  </div>
</form>

<form>
  <input class="st-default-search-input st-search-set-focus garlic-auto-save" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>

Text Content

 * The Platform
   
   
   REVEAL(X)
   
   The industry's only network detection
   and
   response platform that delivers the
   360-degree
   visibility needed to
   uncover the cybertruth.
   
   DEPLOYMENT MODEL
   
   SaaS-Based Solution >
   
   Unified intelligence across on-premises,
   hybrid, and multi cloud environments.
   
   On-Premises Solution >
   
   East-West visibility, real-time detection,
   and intelligent response at scale.
   
   SECURITY
   
   Network Detection and Response >
   
   Use the power of network visibility
   and AI for real-time detection,
   rapid investigation, and intelligent
   response for any threat.
   
   Intrusion Detection System >
   
   Forensics >
   
   PERFORMANCE
   
   Network Performance Monitoring >
   
   Use network data and machine learning to identify network and application
   performance issues and expedite time to response.
   
   Forensics >
   
   TRY IT FOR FREE
   
   
   REVEAL(X) 360
   
   
   LIGHT UP YOUR AWS
   ENVIRONMENT.
   
   No friction.
   No credit card required.
   
   Start Free Trial
 * Solutions
   
   --------------------------------------------------------------------------------
   
   
   SOLUTIONS
   
   With the power of machine learning, gain the insight you need to solve
   pressing challenges.
   
   BY INITIATIVE
   
    * ExtraHop IDS
    * XDR
    * Advanced Threats
    * Ransomware Mitigation
    * Multicloud & Hybrid Cloud Security
    * Implement Zero Trust
   
   BY VERTICAL
   
    * Financial Services
    * Healthcare
    * e-Commerce and Retail
    * Education
    * U.S. Public Sector
   
   
   
   
   
   
   
   THREAT BRIEFING
   
   
   GENERATIVE AI TOOLS
   
   Detect data leaks from employee use of ChatGPT in Reveal(x)
   
   Watch a Demo
   
   

 * Customers
   
   --------------------------------------------------------------------------------
   
   
   CUSTOMERS
   
   Our customers stop cybercriminals in their tracks while streamlining
   workflows. Learn how or get support.
   
   COMMUNITY
   
    * Customer Portal Login
    * Bundle Gallery
    * Community Forums
    * Customer Stories
   
   SERVICES
   
    * Services Overview
    * Quick Starts
    * Training
    * Integrations
    * Resident Expert
   
   SUPPORT
   
    * Support Overview
    * Documentation
    * Appliance Policies
    * Knowledge Base
   
   Featured Customer Story
   
   
   SEATTLE CHILDREN'S HOSPITAL
   
   Seattle Children's and ExtraHop Reveal(x)—Protecting More Than Data
   
   Read More
   
   See All Customer Stories >

 * Partners
   
   --------------------------------------------------------------------------------
   
   
   PARTNERS
   
   Our partners help extend the upper hand to more teams, across more platforms.
   
   CHANNEL PARTNERS
   
    * Channel Overview
    * Managed Services Providers
   
   INTEGRATION PARTNERS
   
    * CrowdStrike
    * Splunk
    * Amazon Web Services
    * Google Cloud Security
    * All Technology Partners
   
   PANORAMA PROGRAM
   
    * Partner Program Information
    * Partner Portal Login
    * Become a Partner
   
   Featured Integration Partner
   
   
   CROWDSTRIKE
   
   * Detect network attacks. * Correlate threat intelligence and forensics. *
   Auto-contain impacted endpoints. * Inventory unmanaged devices and IoT.
   
   Read More
   
   See All Integration Partners >

 * Blog
 * More
    * About Us
    * Events & Newsroom
    * Careers
    * Resources
   
    * About Us
    * What Is Cloud-Native?
    * Leadership
    * Board of Directors
    * Contact Us
   
    * Explore the Interactive Online Demo
    * Sign Up for a Live Attack Simulation
    * Upcoming Webinars and Events
    * Newsroom
    * ExtraHop Media Kit and Brand Guidelines
   
   
   
   
   
   
   
   
   HUNTER CHALLENGE
   
   Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag
   style event.
   
   Read More
   
   
   
    * Careers at ExtraHop
    * Search Openings
    * Connect on LinkedIn
   
    * All Resources
    * Customer Stories
    * Ransomware Attacks in 2021: A Retrospective
    * White Papers
    * Datasheets
    * Industry Reports
    * Webinars
    * Cyberattack Glossary
   
    * Network Protocols Glossary
    * Documentation
    * Firmware
    * Training Videos


Login
Logout
Start Demo





THE PLATFORM


SOLUTIONS


CUSTOMERS


PARTNERS


BLOG


MORE

START THE DEMO

CONTACT US

Back


REVEAL(X)

The industry's only network detection
and
response platform that delivers the
360-degree
visibility needed to
uncover the cybertruth.

DEPLOYMENT MODEL

SaaS-Based Solution >

On-Premises Solution >

SECURITY

Network Detection and Response >

Intrusion Detection System >

Forensics >

PERFORMANCE

Network Performance Monitoring >

Forensics >

Back


SOLUTIONS



Learn More

USE CASES

EXPLORE BY INDUSTRY VERTICAL

Back


CUSTOMERS

Customer resources, training,
case studies, and more.

Learn More

CUSTOMER PORTAL LOGIN

CYBERSECURITY SERVICES

EXTRAHOP SUPPORT

Back


PARTNERS

Partner resources and information about our channel and technology partners.

Learn More

CHANNEL PARTNERS

INTEGRATIONS AND AUTOMATIONS

PARTNERS

Back


BLOG



Learn More
Back


ABOUT US


EVENTS & NEWSROOM


CAREERS


RESOURCES

Back


ABOUT US

See what sets ExtraHop apart, from our innovative approach to our corporate
culture.

Learn More



WHAT IS CLOUD-NATIVE?

CONTACT US

Back


EVENTS & NEWSROOM

Get the latest news and information.

Learn More

SIGN UP FOR A LIVE ATTACK SIMULATION

UPCOMING WEBINARS AND EVENTS

Back


CAREERS

We believe in what we're doing. Are you ready to join us?

Learn More

CAREERS AT EXTRAHOP

SEARCH OPENINGS

CONNECT ON LINKEDIN

Back


RESOURCES

Find white papers, reports, datasheets, and more by exploring our full resource
archive.

All Resources

CUSTOMER STORIES

RANSOMWARE ATTACKS IN 2021: A RETROSPECTIVE

CYBERATTACK GLOSSARY

NETWORK PROTOCOLS GLOSSARY

DOCUMENTATION

FIRMWARE

TRAINING VIDEOS


BLOG


TOP CYBERSECURITY TRENDS FOR 2023: STRATEGIES, INTEGRATIONS, AND BUDGETS

Paul Ditty

December 20, 2022




When an offense shifts, the defense must shift along with it. In the early years
of cyberthreats, all you needed was a sturdy wall. Now, it seems, you need a
bigger wall, more alerts, extended visibility, and more people to manage
operations. According to the Gartner® Hype Cycle™ for Security Operations, 2022:
"Organizations need to support a complex and sometimes competing array of
approaches to security, while also supporting the growth of the organization via
traditional IT infrastructure deployments, cloud-based deployments and hybrid
approaches."

Budgeting and security risk planning go hand in hand, which is why we asked our
security experts to offer their thoughts on emerging trends and technology
considerations for 2023 and beyond.


SECURITY LEADERS MUST ADAPT TO CHANGE

It's no secret that attackers are becoming more sophisticated, but that doesn't
mean everyone believes it. In an ExtraHop survey of IT decision makers, 77% or
respondents remain confident in their ability to mitigate threats, yet 64% also
claim that half of reported data breaches are due to outdated security postures.
As ExtraHop Senior Principal Data Scientist Edward Wu explains, it's critical to
know your attack vectors and how security leaders might rethink defense spending
when they're securing budget:

Spending on perimeter network defense still outpaces spending on post-defense
strategies. The consequence of this imbalance in spending is that attackers are
finding very easy ways to bypass all these network defense tools and, once
inside the environment, they have their run of the place. The current network
defense spending trend is based on an assumption of how attackers attack, and
that assumption is outdated. In 2023, organizations will need to adapt to these
changes and shift their spending allocation to combat today's attack
methodology.

Attacks on vulnerable infrastructure also continue to escalate, especially among
healthcare IoT and educational organizations. Karl Werner, Area Vice President
in Germany, expects to see more executives weighing in on preventative measures:

As high-profile attacks grip the news cycle, security is no longer exclusively
the "headache" of the IT department. It's everyone's problem. The C-suite is
taking note of the impact ransomware attacks could have on their operations and
reputation. Top executives across Germany understand that an attack today could
potentially ruin the company.


COMPANIES WILL EMBRACE XDR AND INTEGRATED PARTNERSHIPS

High-fidelity integrations will also play a key role in the fight for data
protection. Combining resources also helps alleviate friction and allows teams
to share valuable information. Karl Werner sees this trend shifting from nice to
have into a business priority:

Integration is crucial to today's enterprise security landscape. Most businesses
do not value silos or standalone solutions that make it harder to solve their
business challenges around today's complex threats. They prefer solutions that
integrate seamlessly into existing IT infrastructure. From a network monitoring
perspective, many businesses are now very interested in combining NDR with EDR
and SIEM to form more powerful solutions that combine context and action.

Of the many integration solutions out there, extended detection and response
(XDR) has been at the forefront of many conversations revolving around security
measures. This strategy continues to grow in popularity as we come to understand
its true potential, as VP of Sales Engineering in EMEA John Titmus explains:

The promise of XDR is clear: Contextualized, coordinated data helps teams
streamline, prioritize, and automate work. However, the roadmap to actually get
there continues to be a challenge for organizations. In 2023, we will see more
vendors embracing open frameworks to assist in the actual implementation of XDR
that works for each bespoke organization. The cybersecurity industry has
struggled with a one-size-fits-all approach to XDR so 2023 will bring about more
integrations, options and, hopefully, adoption.

One approach to XDR is managed detection and response (MDR), which merges SIEM,
endpoint data security, and network visibility into a single platform. John
Titmus also expects this implementation to continue as we face more advanced
cybersecurity threats:

More businesses are leaning on MDR providers to enable XDR as it ensures they
get the best-retained talent to monitor their networks on a daily basis. XDR is
complex, with huge amounts of data analysis needed, that specialist talent is
critical. However, most organizations hire generalists, which can lead to a
"jack of all trades, master of none" situation. By embracing MDR, businesses can
rest assured that they are dealing with experts in specific clouds, NPM, and
incident response.


AS CYBERSECURITY BUDGETS TIGHTEN, SPEND WILL REMAIN CRITICAL

After talking about security planning, the next conversation will almost
certainly be about cybersecurity spending and what solutions will provide the
best ROI. As ExtraHop Vice President of APAC Ken Chen warns, the cost of getting
hit by an attack without the proper defense could be even more costly:

It seems like a global recession is imminent. As priorities shift, it is
possible that gaps in the cybersecurity framework will be left open. Budget,
staffing or capacity issues may leave businesses at risk or under-prepared for a
cyberattack. The downtime and potential loss in revenue from a cyberattack could
be detrimental to many businesses who are already feeling the impact of a
strained economy. Depending on the type of company impacted (manufacturing or
supply chain), the financial implications could trickle down to other entities
affiliated.

While the global economy's future is uncertain, Ken remains hopeful that 2023
security budget allocations will hold steady, if not increase:

Securing budget for comprehensive IT and cybersecurity initiatives has been
challenging in the past—even in a thriving economic environment. In 2023, we may
continue to slip deeper into a global economic recession, but for various
reasons (geopolitical and digital transformation), I believe cybersecurity
budgets will grow. Security will be a top priority for CIOs in 2023 and the
spend will remain resilient despite a tougher macro environment.

Read More: Takeaways from the Gartner® Hype Cycle for Security Operations, 2022

 

 * Posted in Cybersecurity, Industry Trends, C-Level, Security Threats, NDR
 * See other posts by Paul Ditty


STOP A RANSOMWARE ATTACK
IN PROGRESS.

Hackers are exploiting the Log4Shell vulnerability as part of a ransomware
attack campaign. Stop them in their tracks while exploring the full ExtraHop
Reveal(x) user experience.

Start Demo


RELATED BLOGS

12.13.22


CYBERSECURITY PREDICTIONS: CLOUD SECURITY TRENDS FOR 2023

ExtraHop experts discuss cloud security trends for 2023, sharing their
cybersecurity predictions for cloud security threats, security strategy, and
tools.

Kelsey Milligan

12.6.22


CYBERSECURITY PREDICTIONS FOR 2023: THE THREAT LANDSCAPE

ExtraHop experts share their cybersecurity predictions for 2023. Learn what
attack vectors to anticipate and how advanced threats are expected to evolve.

Kelsey Milligan




SIGN UP TO STAY INFORMED

Javascript is required to submit this form


+

ExtraHop uses cookies to improve your online experience. By using this website,
you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States

EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

PLATFORM

 * Reveal(x)
 * Reveal(x) 360
 * Reveal(x) Enterprise: Self-Managed NDR
 * Security
 * IT Ops

SOLUTIONS

 * Use Cases
 * Explore By Industry Vertical

CUSTOMERS

 * Customer Portal Login
 * Services Overview
 * Support Overview

PARTNERS

 * Channel Overview
 * Technology Integration Partners
 * Partner Program Information

BLOG

MORE

 * About Us
 * Contact Us
 * Events & Newsroom
 * Careers
 * Resources

 * Copyright ExtraHop Networks 2023
 * Terms of Use
 * Privacy Notice
 * Do Not Sell or Share My Personal Information

 * Facebook
 * Twitter
 * LinkedIn
 * Instagram
 * YouTube







Close


suggested results