Search Results

Archives: Reports

If you do not find what you are looking for try a different term or contact us.

Executive Summary The modern data security landscape is rapidly being redefined by the convergence of Artificial Intelligence (AI), AI agents and enterprise data security platforms. A new generation of security platforms is emerging, characterized by deeper integration with core AI systems, the diverse data sources they leverage, adjacent business applications they interact with, agentics extended […]

...

Executive summary SACR is betting that Identity security will change significantly in 2026, shifting from how IAM / Security leaders have historically thought about it. The new identity architecture is undergoing a fundamental change. This is a comprehensive report on the evolving dynamics in our newly released agentic identity and access ecosystem map! Full SACR MM. […]

...

Author Lawrence Pingree is the Head of Data and AI Security at SACR, where he leads research on data protection, AI security, and agentic security models. He brings more than ten years of analyst experience from Gartner and has authored over 300 research notes across cloud security, endpoint defense, SD-WAN, and AI security. Executive Overview […]

...

Introductory Blurb As Identity becomes central to agentic security, Privileged Access Management (PAM) is undergoing a structural shift. It is currently an overlooked category which deserves more attention as we prepare for an identity-centric agentic stack. Our opinion is that privileged access will be central to how human, agents, and machines (NHIs) evolve within the […]

...

The managed detection and response market reached $9.6 billion in 2025 and is projected to grow to $46.9 billion by 2035, reflecting a 17.2% compound annual growth rate driven by rising cyber threats and increasing highly skilled analyst shortage. Despite this growth, operational challenges still remain. According to the 2025 SANS SOC Survey, 69% of […]

...

Actionable Summary Despite decades of investment in IAM, IGA, and PAM, enterprises remain highly vulnerable to identity-based attacks. The root cause is not policy failure, but implementation failure. We’re introducing the concept of Identity Dark Matter. This research defines Identity Dark Matter as the unmanaged identity artifacts within an enterprise stack: i.e., local accounts, legacy […]

...
cybersecurity research icon

Subscribe to the
Software Analyst

Subscribe for a weekly digest on the best private technology companies.