The top-10 hottest security technologies, according to Gartner

Cloud security, endpoint detection and behavioural analytics are all sizzling right now, according to market watcher

Cloud access security brokers (CASBs) and endpoint detection and response have topped Gartner's list of top 10 information security technologies to back in 2016.

CASBs provide a control point for cloud providers to make sure cloud use remains secure and compliant. According to the market watcher, the rise in popularly of software-as-a-service (SaaS) "exacerbates the frustration" of security teams looking for visibility and control of the cloud.

Gartner claims that: "Many software as a service (SaaS) apps have limited visibility and control options; however, SaaS adoption is becoming pervasive in enterprises, which exacerbates the frustration of security teams looking for visibility and control. CASB solutions fill many of the gaps in individual cloud services, and allow chief information security officers to do it simultaneously across a growing set of cloud services, including infrastructure as a service (IaaS) and platform as a service (PaaS) providers."

End point detection and response (EDR) is a tool which records numerous end point and network events and stores them either locally on the endpoint or in a centralised database. This information is then examined in an effort to catch potential breaches early.

Gartner claims that: "The market for endpoint detection and response (EDR) solutions is expanding quickly in response to the need for more effective endpoint protection and the emerging imperative to detect potential breaches and react faster."

Among other top tech trends singled out by Gartner were user and entity behavioural analytics, a tool that gathers information about user trends and behaviour, and pervasive trust services, which extend protection capabilities of devices connected by IoT.

Nonsignature approaches to endpoint prevention; microsegmentation and flow visibility; security testing for DevOps; intelligence-driven security operations centre orchestration solutions; remote browsers; and deception were also included in Garter's top 10.