Online Threat Alerts (OTA)
An anti-cybercrime community alerting the public.

What the Gartner DSPM Report Reveals About the Future of Data Security

Cloud adoption is great—we're not debating that. Cloud service providers like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud have granted organizations worldwide greater scalability, flexibility, and opportunities for collaboration. However, they have also increased security complexity, with most organizations having unused, unknown data repositories that cybercriminals could exploit.

This is where data security posture management (DSPM) tools come in. A relatively new concept, first coined by Gartner in 2022, DSPM is an instrumental tool for security data in increasingly complex cloud environments. While Gartner has not yet published a Magic Quadrant for DSPM, the research and advisory firm has released an “Insight Innovation” report into the technology. So, without further ado, let’s explore what it reveals about the future of data security.

What is DSPM?

According to Gartner, DSPM helps organizations discover, monitor, and secure their data across CSPs, Software as a Service (SaaS), and Infrastructure as a Service (IaaS) platforms. It offers visibility into data flows and helps uncover "shadow data"—information stored in overlooked or unknown repositories that could pose security risks if left unsecured.

DSPM also provides organizations with automated capabilities to map data assets, track data residency, and ensure compliance with security regulations, such as the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA), contributing to its growing importance in the cloud security landscape.

The Rise of DSPM and its Role in Data Protection

As noted, the increasing complexity of cloud environments has resulted in a surge of data repositories, many of which need to be updated, discovered, and exposed. According to Gartner, traditional security solutions typically fail to discover these repositories and secure the data that resides within them. DSPM, however, protects known data while discovering unprotected or misconfigured data sources.

The most important role DSPM plays in data security is helping companies assess their overall security posture, establish their data security, locate vulnerabilities, and determine compliance with relevant data security regulations and standards. It works best alongside cloud security posture management (CSPM), an oft-confused technology that focuses on weaknesses in cloud infrastructure.

Benefits of DSPM

While the primary benefit of DSPM is discovering and securing potentially unknown data in cloud environments, Gartner lists three more specific benefits and uses it expects security and risk management leaders to glean from the technology:

  1. Data Mapping: DSPM solutions stand out by enabling detailed mapping of data repositories’ geographic locations, uncovering hidden repositories, detecting misconfigurations, and identifying sensitive data at risk across various cloud providers.
  2. Enhanced Data Security Posture: DSPM technology improves data security by classifying data, tracking pipelines, and assessing risks related to exposure, compliance, data residency, breaches, or ransomware.
  3. Business Advantages: With a unified management console, DSPM supports comprehensive data risk assessments. It strengthens security through data catalog integration, generating alerts, and streamlining security orchestration across different tools.

Gartner’s Predictions for DSPM

According to Gartner’s report, by 2026, over 20% of organizations will rely on DSPM solutions to manage and secure their data across known and unknown repositories. But adoption won’t stop there: Gartner expects the growth of DSPM to mirror the cloud adoption and the continued proliferation of data spread across diverse systems.

Gartner notes that DSPM vendors, including startups and established firms, are developing sophisticated tools to tackle shadow data risks. Vendors like Concentric AI, Cyera, and Dig Security have emerged as key players, each offering unique capabilities for discovering data, mitigating risks, and ensuring compliance.

That said, Gartner notes that DSPM is still in its relative infancy, with many organizations having only around two years of market experience, many of which have only recently emerged from “stealth mode.” As such, some of these vendors may be acquired or exit the market. Each vendor has slightly different product capabilities and approaches, and most DSPMs only integrate with a limited set of IAM and SaaS products.

In the coming years, we will likely see the DSPM market mature, with smaller vendors integrated into larger cybersecurity conglomerates. This consolidation will likely result in a more cohesive market with less variation between products and improved integration with third-party products.

Similarly, as the DSPM market matures, we will likely see increased DSPM adoption. Organizations will realize that traditional data security solutions can no longer keep up with the evolving risks presented by cloud-based data repositories. Furthermore, as cyber threats become more advanced, DSPM tools will likely evolve to offer real-time risk assessments.

Conclusion

The key takeaway here is that DSPM is fast becoming a crucial part of effective cloud security. It is potentially the solution to issues with lost, unknown, or exposed data in increasingly complex cloud environments. While the market is still young, it is maturing fast and will likely soon be a key tool in many organization’s security strategies. Even if you’re not ready to purchase DSPM now, keep an eye out for market developments for future interest.

Check the comment section for additional information, or share what you know or ask a question about this article, by clicking the 'View or Write Comment' button below.

Note: Some of the information in samples on this website may have been impersonated or spoofed.

Share this article with others.
Write / View Comments (0)
View on Online Threat Alerts (OTA)
Help Maintain Online Threat Alerts (OTA)