Tar Agnostic 2025
Tar Agnostic 2025
CIOs and other IT leaders can use this research to benchmark their technology
adoption plans and practices across operations, network, digital workplace,
cloud, edge and data center. This research offers technology adoption
timelines and risk and value drivers for 47 technologies from 125 of their peers.
In planning
nter
a ce Piloting
t Composable O
da
infrastructure pe
r
nd Edge stream
Policy as code
at
a
analytics
io
AI assistants for
ge
Cloud
ns
platforms
Digital experience Extended detection
Cl
Network function
Unified endpoint virtualization
management (UEM) tools (NFV)
Digital employee 5G cellular
Di
experience DaaS
gi
(802.11be)
or
or
lw
kp et
w
la Group interactive N
ce design
Network security
policy management
(NSPM) tools
100% In deployment
In piloting
52% +10%
62%
50%
48%
38%
0%
Previous year TAR 2025 TAR
36%
43% Technical 21%
incompatibility
Cybersecurity risk Other
or architecture
complexity
Improved speed
40% and agility
25%
17%
0%
Previous year TAR 2025 TAR
s
on on
In Planning
In planning i Ex
ati rat pe
er eg ri e
Op nt nc
ity di ea
r an GraphQL
nd
cu
Crypto-Agility
e APIs
e ur Piloting de
ct
Conversational Piloting
Piloting CSP-Native DLP
S
si
A
Breach and
I-r
gn
Attack Simulation
ea
Foundation
dy
models Application
generation SOAR
n/
da
Shielding
Da
Design
ta
Mobile Application
Security Testing systems
ta S
Container analytics
Decision Response (ITDR) Application Security Assistants
Augmented managementa
(rename for Hybrid Mesh Zero Trust Already as a Service environments Internal API threat
Application assistants
Already Deployed Low-code Already protection
D eve l o p m e
Federated
Security
map the adoption
Innersourcing ofweb50
appstechnologies
tooling according to their
Threat deployment stage,
modeling
compliance
automation a
Programmable
and network and digital workplace. We offer technology data adoption
Augmented
timelines portfolio leaders CSPM
can use this analysis to benchmark their
Privacy investment
Digital business Observability assistants a
Threat Modeling
benchmark their adoption plans with their peers
tools and review key adoption trends.
nt pl
infrastructure
ve r i
catalog technology
d AI
Automation
and riskPrompt
andengineering
value drivers for 52 technologies from 144 of their peers. plans for SPM frameworks, processes and tools against Toolspeers.
Management Software
c ur
processing
and
ri t y
Computing engineering
cu
Enterprisetechnologies
nd
to
IoT Authentication CPS Security The value factor awarded to each The risk factor awarded to each technology The adoption phase is determined by
The value factor awarded to each The risk factor awarded to each technology The adoption phase is determined by The value score for each technology is The risk score for each technology is The adoption phase is determined by
nc
technology is based on the analysis is based on the analysis of potential risks the current deployment plans for a determined by analyzing the value level Machine Identity
determined by analyzing the
FIDO risk level
CIEM the current deployment plans for a
na
reported by respondents planning to use or majority of organizations. Technologies efficiency, improved speed and agility,
engineering or unpredictable costs, cybersecurity risk, placed on the border between phases
of value drivers, including increased Composable
posed, including talent unavailability; high majority of organizations. Technologies Managementreported by respondents planning to OpenID
/P
productivity, and delivery of superior complexity, and inability to switch deployment phase.
agility; enabled resilience and reliability; technical incompatibility or architecture g
are on the cusp of moving into the next increased cost-efficiency, improved speed account potential risks such as talent
Identity
Decentralized ec
are on the cusp into the next tools
enhanced employee productivity; and complexity; and lack of vendor or service deployment phase. y and agility, enabled resilience, enhanced unavailability,
Wallets high or unpredictable deployment
rs phase.
capabilities to consumers. providers due to vendor lock-in.
ad employee productivity, and delivery of
Identity
costs, cybersecurity risk, and technical be
-re
enabled innovation by internal consumers. provider
Generative AIsupport.
Reinforcement Cy OpenTelemetrya
AI
superior capabilities to consumers. incompatibility or architecture complexity.
learning Ide
n tity/
Acces
s Management D e pl on s
p e ra t i
Low Medium High Low
oy m e nt a n d oHigh
Medium
Low Medium High Low Medium High Low Medium High Low Medium High
Key Take-Aways
Schedule Now
Enterprise value Deployment risk Adoption phase Key Take-Aways
Security and Risk Management
The value factor awarded to each technology is The risk factor awarded to each technology
In planning
The adoption phase is determined by In Planning Software Engineering
ork Enhanced
Se
cu
based on the analysis of value drivers, including is based on the analysis of potential risks the current deployment plans for a majority tw rit
Ne y
Internet API Access Control
er and
increased cost-efficiency, improved speed posed, including talent unavailability, high of organizations. Technologies placed on the Security and risk management (SRM) leaders expect some contraction in purchasing
ntemployee border between phases are on the cusp of
Dinext deployment phase. Improving speed and Cloud-Managed
agility is the top motivation for new technology adoption,
ce capabilities power this year. While the majority of SRM leaders (73%) expect their budgets to increase
agility, enabled resilience, enhanced or unpredictable costs, cybersecurity risk, Piloting Security
ta
productivity and delivery of superior technical incompatibility or architecture
moving into the gi a dramatic shift from last year.
Networks Rapidly evolving business
(CMNs) andService
customer
Edge needs are driving
ta in 2024, only about one-fourth Adaptive
of those anticipating budget increases expect increased
da
Endpoint
to consumers. complexity,
AI cloud DaaS
and inability to switch optimization
providers lw portfolio Piloting software engineering leaders to place significant emphasis
Detection and on theZero
speed and agility with
nd
Identity-Based
services Piloting
due to vendor lock-in. tools (DOTs) purchasing power. The remaininggovernance49% expect their budget increases to be nominal and in Trust
Adaptive project which they’re able to deliver new solutions. This explains
Segmentation why improving
Response (EDR) speed and agility
Network Access
line with inflation. Finally, 27% of respondents expect their budgets to decrease in nominal
or
a
(Microsegmentation)
Cloud-tethered management and is the most common value driver reported for this year’s roadmap, with leaders selecting it
ge
kp
PC as a Agile
compute service or real terms. reporting tools
ed
la
beyond IT
ks
as the primary
Networkvalue driver for 47% of the technologies.
Automation This marks a dramatic shift from 12
SASE
ce
Extended
or
d,
SRM leaders look optimistic about timelines for technology adoption at their organizations. months ago,Edge
when IoT the most common value drivers for technologies
Detection and on the roadmap were
ou
ew
Low Medium High Low Medium High Modular Automation and Response
Multimethodology
o
Deployment
Of the 44 emerging technologies covered in our survey, 32% are “in deployment,”
dashboards and 66%
m
es
frameworks Completion
Fra
vic
Desktop as a service
HPC Lean portfolio As technologies
Distributed have proliferated and become inherently complex, new technology
cases and weighing them against the complexity and cost involved. Cloud
Edge servers Unified endpoint security UEM management AI-enabled PPM deployment presents challenges in integrating
Deploymentthem successfully into the existingITSM Platforms
Organizations are taking a Serverless
“pilot and prove” stance to being AI-ready. While Microservices Completion
Digital Workplace
Consumption-
infrastructure Visual collaboration tools
SRM leaders see the key value of their cybersecurity technology investments as reducing environment.
API Technical
Edge incompatibility/architecture
2023 complexity is therefore the
AI has taken the
based world by storm, organizations are still figuring out the optimal
sourcing most citedComputing
Management risk factor, noted
Serverless
by software engineering leaders as the primary
Application Data
risk factor
LPWA
way to leverage and
Multicloud Workplace analytics Remote expert risk exposure. Sixty-eight percent of technologies are being adopted to reduce the Computing Management
Objectembed it as part of their workflows. Of the 36 technologies PaaS
guidance solutions Agile project Strategic portfolio for 43% of the technologies on the roadmap this year.
Cloud-Tethered
Edge
storage Hybrid
Smart meeting room enterprise’s risk exposure. In comparison, 23% are expected to enable
management tools resilience and reliability,
surveyedPaaSin the roadmap thiscloud
computingyear, consistent with thesolution/system
trend last year,
(Smart 75% of PMO/PPM management Compute
Everyday AI
Already video meeting system) particularly those related to identity and access
Alreadymanagement (IAM) and application security.
RPA-enabled Data and Analytics
technologies are being piloted, 22% aredeployed in deployment and 3% are being planned. as a service Deployed Cost
Cloudconsiderations
Infrastructure are becoming less of a factor in software
Cloud MDM engineering leaders’
Governance
APM Container Only four technologies from the total survey sample are valued for their ability to improve
PPM
It is currently projected that all the technologies in deployment are expected to
management technologyand Platform
deployment decisions. In last year’s survey, cost considerations were Unified Endpoint
speed
Adaptiveand agility — cloud-native application protection platforms (CNAPPs), crypto-agility, Services (CIPS) Management
reach
Wi-Fi 6Eadoption by the end of 2024. a clear priority for software OS
engineering leaders as they were cited prevalently, both for
Infras
Network automation
SOAP network detection and response (NDR), and threat modeling automation. However, SRM
program Containers
Observability management the potential value technologies could create by reducing ongoing costs andGenerativefor theAIrisk
This is no doubt going to be challenging; data from the 2023 Gartner
Automated AI in tracing
the
Distributed leaders see that value as potentially being limited by the risk of unpredictable costs. Hyperconverged Data Storage
5G services
Infrastructure incident of high or unpredictable
Infrastructure AI Cloud costs from deploying the technology. That did not hold true
Management
ute
Portfolio- Desktop as
Enterprise
NFV Survey reveals only an average of 48% of AI proofs ofresponse
automation concept (POCs) Software Services
this year. Instead, this year no technology Services
has “providing cost efficiency and savings”
AI for IT Operations
Organizations invest in application and data security
level resource to support the growing adoption
Application a Service
make it into production, and, on average, itDigital
takes 8.2 months to go from POC
mp
container Backup
Native cloud driven by the growing number of applications. To make more responsive applications and
inflection point between piloting AI initiatives monitoring
and adopting AI at scale, and the Managed IoT
ZTNA enhance user experiences, more organizations are building digital applications on cloud- Cloud
Services Infrastructure
onus is on D&A leaders and their teams to make a successful transition.Open
Virtual PPM for new Deployment risk has become a more important factor in technology adoption
Analytics as Code plans
(IaC)
support telemetry native platforms. This is pushing them to take measures to secure APIsproduct and app data. Of Container
Continuous Dynamic funding over the past 12 months. Software engineering leaders are exhibiting caution in their
Backup
People are the biggest
agents the 17 technologies aimed at securing applications and data, 35% are in deployment, while
development
SASEconstraint in the people, process and technology
compliance and investment
Human-centric adoption plans for technologies they rate as high risk. Only 29% of
Enterprise high-risk
Robotic Processtechnologies
automation
trifecta associated with AI-readiness. As of last year, respondents cited 44% 59% remain inmodeling
the pilotingDynamic
phase.resource
Organizations expected the remaining technologies Augmented Analytics Automation
change are currently in deployment, a shift
Endpoint from last year
Backup when the high-risk technologies were
under deployment, including application
planning and security posture management and software
of the technologies were plagued by talent unavailability this year as well. It leadership
evenly split between the piloting and deployment phases. Value Stream
ns
w
was identified as the biggestAI roadblock
monitoring
in the adoption of these emerging
io
Management
or
et
networking Value-tracking
or r Management
at
ag Platforms
k
technologies. As per the 2024 Gartner Chief Data and Analytics Officers’ (CDAO) pe SRM Leaders are investing in generative AI (GenAI) to combat GenAI risks. SRM
mechanisms Software engineering
e leaders areNative
Container exploring Continuous
several AI-driven technologies n
io as they
Policy as
Agenda Survey, talent recruitment and retentioncode woes have been among the
O Off-cycle
rationalize thean hype Storage
d D and enthusiasm for these new
Delivery tools against their
(CD) at
mrisks and
leaders ranked GenAI-powered cyber-attacks
portfolio (such as phishing, scams, business email
a uto engineering leaders’
Source: 2024 Gartner Technology Adoption Roadmap for Midsize Enterprises Survey
top 3 challenges for D&A leaders over the past three years. Upskilling current unproven utility. There tabare seven AI-related technologies on software
compromise [BEC] and malware) as reprioritization
their top concern from the growth of GenAI, with the ase IT A
staff with generative AI (GenAI) skills is the main way advanced generative AI adoption roadmaps this year, all of which are currently in the piloting phase. With the
risk of GenAI application or data breaches (such as training data tampering, or attacks
organizations choose to address GenAI talent needs. exception of prompt engineering, leaders rate all of the AI-driven technologies as high risk.
on AI models) second. At least half of thePro167c escompanies
se s surveyed plan to invest in
cybersecurity technologies between 2023 and 2025 to safeguard their GenAI applications.
@ 2025 Gartner, Inc. and/or its affiliates. All rights reserved. CM_GTS_3483939
Speed and agility are the greatest value proposition for being AI-ready. The need to improve developer experience and productivity continues to drive
Related technologies include specialized application security testing tools, prompt security
Respondents perceive that 83% of the technologies that make organizations AI- technology adoption. Improving developer experience or productivity was the second
technology, and privacy-enhancing technologies (such as homomorphic encryption and Keymost
Take-Aways
ready have the potential to enhance speed and agility. As a secondary value factor, common value driver software engineering leaders reported and was associated
Key81%
Take-Aways synthetic data) for GenAI applications. Around 42% of the respondents mentioned that
of the technologies have also been associated with contributing to an increase with 19% of technologies on this year’s roadmap, which is consistent with findings from
Keyinvestment
takeaways was underway for generative AI user interfaces (“virtual assistants”) in existing Cybersecurity
Infrastructure andbusiness
in organizations’ Operations (I&O)this may sound good, 49% of leaders highly
value. While last year.
2024 SPM tools,
security Frameworks, Processes
while 37% give precedence andtoTools Investments
GenAI-powered Roadmap
third-party, supply chain,
involved in AI report that estimating and demonstrating value from AI is their top and vendor risk management platforms.
I&O has increased the pace MSEs lagsecure
Building in adoption of security
software orchestration
engineering solutionsautomation and response
is a high priority, (SOAR)
with leaders
challenge when it comes to AIofimplementation.
technology adoption to respond
As AI becomes to the growing
pervasive within and
Due to the economic headwinds in 2023, strategic portfolio leaders are prioritizing despite earlier
indicating plans to
significant adopt
plans toin 2023.
adopt MSEs
new gain accessintothe
technologies security
securitytechnologies
and verification
changing
the demands
organization, of theirmanagement
AI change customers. Of the 52 technologies
activities surveyed
become all the in the roadmap
more crucial. SRM leaders
smaller pilotsinvest heavily
in 2024 in identity
as opposed infrastructure
to organization protection.
level The increasing
deployments. complexity
More than through
category.relationships
While softwarewithengineering
managed service
leaders providers. They lagplans
report adoption in deploying
across allSOAR due to
categories
this year, 52% are
Organizations thatinperform
deployment
change and 48% are in pilot,
management compared
frequently with 40%
experience of technologies
greater of the threat
two-thirds oflandscape andportfolio
the strategic proliferation of identities
management having
(SPM) access to processes
frameworks, corporate resources SOAR’s high
to support risk levels
delivery and medium
activities, perceived
the security value. In addition,
and verification categorythey
hasare slow number
a high in adopting
of