If you do not find what you are looking for try a different term or contact us.
Executive summary SACR is betting that Identity security will change significantly in 2026, shifting from how IAM / Security leaders have historically thought about it. The new identity architecture is undergoing a fundamental change. This is a comprehensive report on the evolving dynamics in our newly released agentic identity and access ecosystem map! Full SACR MM. […]
...Author Lawrence Pingree is the Head of Data and AI Security at SACR, where he leads research on data protection, AI security, and agentic security models. He brings more than ten years of analyst experience from Gartner and has authored over 300 research notes across cloud security, endpoint defense, SD-WAN, and AI security. Executive Overview […]
...Introductory Blurb As Identity becomes central to agentic security, Privileged Access Management (PAM) is undergoing a structural shift. It is currently an overlooked category which deserves more attention as we prepare for an identity-centric agentic stack. Our opinion is that privileged access will be central to how human, agents, and machines (NHIs) evolve within the […]
...The managed detection and response market reached $9.6 billion in 2025 and is projected to grow to $46.9 billion by 2035, reflecting a 17.2% compound annual growth rate driven by rising cyber threats and increasing highly skilled analyst shortage. Despite this growth, operational challenges still remain. According to the 2025 SANS SOC Survey, 69% of […]
...Actionable Summary Despite decades of investment in IAM, IGA, and PAM, enterprises remain highly vulnerable to identity-based attacks. The root cause is not policy failure, but implementation failure. We’re introducing the concept of Identity Dark Matter. This research defines Identity Dark Matter as the unmanaged identity artifacts within an enterprise stack: i.e., local accounts, legacy […]
...Author Aqsa Taylor is the Chief Research Officer at Software Analyst Cyber Research, where she leads research initiatives and the CISO Arm (security leaders community). She is a published author with over a decade of experience building cloud security platforms and experience consulting more than 44% of Fortune 100 organizations on their security posture. Readers, […]
...Subscribe for a weekly digest on the best private technology companies.