Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

Foreword

The only constant in our cybersecurity industry is change leaving organizations with a myriad of emerging cybersecurity technological trends that can secure their digital transformational journey and thwart looming cyber threats. However, innovation in cybersecurity is not only focused on improving the security of the digital environments but also to provide an agile architectural blueprint adapted to the increasingly distributed, decentralized and complex organizations environment.

Those challenges are heightened by the cybercriminals’ speed of innovation. Cybercriminals and state-sponsored actors keep innovating at a fast rate, leveraging new technologies to steal data, commit fraud and extort money. They now do not only try to paralyze critical national infrastructures, but also local and regional authorities, which realize they do become a target, nobody being exempted from being attacked.

Concepts like the cybersecurity mesh are presenting a modern conceptual approach to security architecture. Emerging trends, such as the metaverse, changes the creation, use and consumption of digital services, and raises new concerns and challenges in terms of security. When Identity is the new perimeter and data the new oil, solutions such as Privacy Enhancing Cryptography (PEC), applied to concrete use cases protect data in use.

To top it all, artificial intelligence is infused to all cybersecurity areas. Deep learning and machine learning are already in use but AI use cases and usability in the cybersecurity field goes beyond. Cognitive AI (CAI), frugal AI, are a few examples of emerging trends that will shape the evolution of cybersecurity.

Zeina Zakhour
Global Chief Technical Officer, Digital security, Atos

In order to help organizations, keep an eye on the latest cybersecurity tech trends, and identify the security technologies that can help them address cyber threats efficiently, we created the Atos Cyber Tech Radar.

With this yearly updated radar, organizations can keep abreast of the emerging cybersecurity innovations, and adopt an agile cybersecurity strategy that can adapt to the changing digital environments.

Our Atos security experts are tracking over 150 cybersecurity technological trends that are shaping and transforming the industry as we speak. We built our radar around eight major cybersecurity domains, because we believe those are the most critical for the end-to-end management of your security posture and security of your digital transformation.

  • Advanced Detection & Response
  • CERT & GRC services
  • Identity & Access Management
  • Endpoint and Mobile Security
  • Network Security
  • Application Security
  • Cloud Security
  • Data security

Let us take a few figures

74%

of companies experienced a security incident in 2021 (Security Leaders Research Report, Vectra)

64%

increase of cybercrimes costs, while the number of those cybercrimes only rose by 7% (Internet crime report 2021, FBI)

79%

of organizations suffered an identity-related breach in the last 2 years (Identity Defined security Alliance)

61%

of all SMBs have reported at least one cyber-attack during the previous year. (Verizon)

For each cybersecurity domain, we have grouped the cybersecurity technological trends in terms of speed of adoption :

  • Zero to two years: Mature technologies are either already adopted by most organizations or will be in the next two years In other words, these technologies have become an integral part of the security strategies of most companies.
  • Two to five years: Proven technologies are usually adopted in the next two to five years cycle as organizations improve in maturity.
  • 5 years and above: emerging trends will be adopted by the mainstream after approximatively five years or more. Still, Organizations with maturity cybersecurity level can adopt such emerging trends earlier.

 

For each technology trend captured in our radar, we have worked on :

  • The main business use cases it addresses.
  • The benefits it brings with a focus, when applicable, on the specific market verticals.
  • The main challenges to adoption that organizations must take into consideration when deploying any of those cybersecurity technology trends.

 

Cybersecurity innovation is a key contributor to the success of the digital revolution as we know it today. And undoubtful, it will continue to be a key foundation for safe and secure adoption of future technology trends such as quantum, edge & swarm computing, ethical AI and immersive experience.

Our Cyber Tech Radar aims to help you navigate the breadth of cybersecurity technologies and support you in refining the cybersecurity strategy of your organization.

Contributors

Aleksander Pawlicki, Allen Moffett, Amalia Lin, Ana Bura, Andrei Chipaila, Andrei Dumbrava, Angel Polamaro, Boubacar Camara, Christian Radu , Cleiton Lenkiu, Dan Schaupner, Dragos Pelian-Popa, Ernesto Parodi, Farah Rigal, Gabriel Priceputu, Gabriela Gorzycka, Geert Fieremans, Ivana Getia, Laurence Begou, Lia Predut, Marc Llanes, Marcin Krysinski, Marco Gruber, Marcus Lahm, Mihai Belu, Mircea Avram, Mohan Ayare, Nitin Kulkarni, Philippe Bodden, Raul Salagean, Reli Arras, Thierry Winter, Vali Pop, Vasco Gomes, Vinod Vasudevan, Wojciech Bohatyrewicz, Zeina Zakhour.