0% found this document useful (0 votes)
40 views1 page

Tar Agnostic 2025

The 2025 Technology Adoption Roadmap provides insights for CIOs and IT leaders on benchmarking technology adoption across various domains, highlighting timelines and risk/value drivers for 47 technologies. Key takeaways include an increase in deployment of technologies, with cybersecurity identified as the top risk, and a focus on speed and agility as primary value factors. IT leaders are prioritizing 'as a service' technologies and addressing technical debt while implementing generative AI solutions to enhance operational efficiency.

Uploaded by

Havoc2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views1 page

Tar Agnostic 2025

The 2025 Technology Adoption Roadmap provides insights for CIOs and IT leaders on benchmarking technology adoption across various domains, highlighting timelines and risk/value drivers for 47 technologies. Key takeaways include an increase in deployment of technologies, with cybersecurity identified as the top risk, and a focus on speed and agility as primary value factors. IT leaders are prioritizing 'as a service' technologies and addressing technical debt while implementing generative AI solutions to enhance operational efficiency.

Uploaded by

Havoc2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

2025 Technology Adoption Roadmap

CIOs and other IT leaders can use this research to benchmark their technology
adoption plans and practices across operations, network, digital workplace,
cloud, edge and data center. This research offers technology adoption
timelines and risk and value drivers for 47 technologies from 125 of their peers.

Enterprise value Deployment risk Adoption phase


The value factor awarded to The risk factor awarded to each The adoption phase is determined
each technology is based on technology is based on the analysis by the current deployment plans
the analysis of value drivers, of potential risks posed, including for a majority of organizations.
including increased cost-efficiency, cybersecurity risk, implementation Technologies placed on the
improved speed and agility, ability cost, talent unavailability, border between phases are on
to drive innovation or competitive macroeconomic uncertainty and the cusp of moving into the next
differentiation, and enhanced architecture complexity. deployment phase.
employee experience.

Low Medium High Low Medium High

In planning

nter
a ce Piloting
t Composable O
da
infrastructure pe
r
nd Edge stream
Policy as code
at
a

analytics
io

AI assistants for
ge

Cloud
ns

sustainability infrastructure as code


ed

Industry cloud Observability


d,
ou

platforms
Digital experience Extended detection
Cl

Edge as a service (EaaS)


In monitoring (DEM) and response (XDR)
Edge computing deployment
Service orchestration
Cloud financial Automated and automation
Hybrid
management tools incident response platform (SOAP)
cloud
computing
AI cloud services
Data discovery Autonomous workload
Distributed hybrid infrastructure optimization tools
Cloud
high-performance Internet of things (IoT) networking Log monitoring
computing and analysis
Continuous compliance
(HPC) IoT platform as a service (PaaS) Digital platform automation
conductor (DPC) tools Application release
Cloud-native
IoT platform
infrastructure Already orchestration (ARO)
deployed
Smart meeting room systems

IT sustainability Network automation Zero-trust


management network
access
Desktop as a Unified communications (ZTNA)
service (DaaS) as a service (UCaaS) Secure access service
optimization tools edge (SASE)
Managed device
life cycle services AI ethernet
fabric
Software as a service (SaaS) Mobile threat defense
management platforms (SMP)

Network function
Unified endpoint virtualization
management (UEM) tools (NFV)
Digital employee 5G cellular
Di

experience DaaS
gi

(DEX) tools Wi-Fi 7


ta

(802.11be)
or
or
lw

kp et
w

la Group interactive N
ce design
Network security
policy management
(NSPM) tools

Key take-aways from the 2025 roadmap

More technologies are in deployment in 2025.

Distribution of technologies by adoption stage


Percentage of technologies

100% In deployment
In piloting

52% +10%
62%

50%

48%
38%

0%
Previous year TAR 2025 TAR

Cybersecurity is the top risk for technology adoption.

Primary risk driver of technologies this year


Percentage of technologies

36%
43% Technical 21%
incompatibility
Cybersecurity risk Other
or architecture
complexity

Speed and agility remain a primary value factor.

Enabling resilience and speed and agility as a value driver


for technologies in previous and current year’s TAR
Percentage of technologies
60%
60% Enable resilience
and reliability

Improved speed
40% and agility

25%

17%

0%
Previous year TAR 2025 TAR

Some other take-aways


2025 key technology trends

IT leaders continue to emphasize aaS Operations technologies are being piloted


technologies while also emphasizing despite the risk levels associated with
sustainability efforts. Of all the “as a service” deploying them. Operations technologies had
technologies included on the roadmap the highest percentage of pilot technologies
this year (edge as a service, IoT PaaS, desktop among the four groups, with 57% in piloting.
as a service [DaaS] optimization tools, DaaS,
SaaS management platforms [SMP] and
unified communications as a service [UCaaS]),
all technologies except DaaS optimization
tools are in deployment.
Network technologies are foundational to
digital initiatives, with IT leaders viewing
them as high-value technologies. Of the
nine network technologies, 67% are deemed
high value, the highest percentage of high-value
Most IT leaders have implemented at least technologies among the four groups.
one generative AI (GenAI) use case within
their function. Respondents noted that they
have fully implemented GenAI solutions for
IT use cases, with 77% indicating they have
implemented at least one such use case.
GenAI gains traction. GenAI is widely
implemented in IT functions, reflecting its
growing role in enhancing operations and
driving innovation across organizations.

Managing technical debt is a priority for IT


leaders, with the majority dedicating half their
budget to address those concerns. Of all the
respondents, 52% indicated they spend at least
half their budget addressing technical debt. Digital workplace technologies boost
speed and productivity. IT leaders focus on
sustainability and “as a service” technologies,
optimizing operations and reducing
environmental impact through strategic
tech deployment.
IT leaders are prioritizing less risky digital
workplace technologies to increase speed and
drive productivity. Of the 10 digital workplace
technologies on the roadmap, 70% are in
deployment, and 30% in pilot.
Operations technologies forge ahead amid
deployment risks. Operations technologies
are leading in pilot testing despite associated
risks, driven by their potential to revolutionize
operational efficiency and competitive
Cloud, edge and data center technologies are advantage.
continuing to be deployed for their ability to
enable speed and agility. Scaling in the cloud,
edge and data center environments remains
the top priority for IT leaders, with 86% of these
technologies in these environments in the
deployment stage. Addressing technical debt as a key budget
priority. IT leaders prioritize managing
technical debt, dedicating significant budget
portions to streamline operations and improve
IT infrastructure efficiency.

Technology adoption roadmaps across


functions for your organization
Get adoption timelines and risk and value drivers for key technologies
from your peers across:
2024 Technology Adoption Roadmap 2024 Technology Adoption Roadmap
for Security and Risk Management
• Infrastructure and operations • S
 oftware engineering
for Software Engineering
This infographic identifies 44 security-related technologies being adopted by
More than 140 software engineering leaders from large enterprises shared
global enterprises, and maps them according to adoption phase, deployment
their anticipated adoption timelines, enterprise value and deployment risk for
risk and enterprise value. Security and risk management leaders can use this

• Midsize enterprises • Strategic portfolio management


47 key technologies and practices. Use this infographic and analysis to guide
infographic to compare their technology investments with their peers.
technology adoption decisions and assess essential trends.

2024 Technology Adoption


• SRoadmap
ecurity and risk management
for Data and Analytics
Enterprise Value Deployment Risk Adoption Phase
The value factor awarded to each The risk factor awarded to each The adoption phase is determined by
Enterprise value Deployment risk Adoption phase
The value score for each technology is The risk score for each technology is The adoption phase is determined by
technology is based on the analysis technology is based on the analysis of the current deployment plans for a
determined by analyzing the value level determined by analyzing the risk level the current deployment plans for a
of value drivers, including increased potential risks posed, including talent majority of organizations. Technologies
reported by respondents planning to use or reported by respondents planning to majority of organizations. Technologies
cost-efficiency, improved speed unavailability, high or unpredictable placed on the border between phases using the technology, taking into account use or using the technology, taking into placed on the border between phases
and agility, enabled resilience, costs, cybersecurity risk, technical are on the cusp of moving into the next increased cost-efficiency, improved speed account potential risks such as talent are on the cusp of moving into the next
This survey of technology adoption timelines and risk and value drivers enhanced employee productivity, incompatibility or architecture deployment phase. and agility, enabled resilience, enhanced unavailability, high or unpredictable deployment phase.
and delivery of superior capabilities complexity, and inability to switch
highlights 36 technologies and techniques needed for AI readiness. to consumers. providers due to vendor lock-in.
employee productivity, and delivery of
superior capabilities to consumers.
costs, cybersecurity risk, and technical
incompatibility or architecture complexity.
D&A leaders should use this research to benchmark their adoption
plans for AI-ready data, analytics and AI, and AI-ready governance.
Low Medium High Low Medium High
Low Medium High Low Medium High

s
on on
In Planning
In planning i Ex
ati rat pe
er eg ri e
Op nt nc
ity di ea
r an GraphQL
nd
cu
Crypto-Agility
e APIs
e ur Piloting de
ct
Conversational Piloting
Piloting CSP-Native DLP
S

user interfaces Generative


ite
pp

si
A

Breach and
I-r

gn

Data Security Service design AI


ch
lic

Attack Simulation
ea

Posture Management mesh Event-driven


Ar
at

Foundation
dy

Natural language Synthetic data APIs


io

models Application
generation SOAR
n/
da

Shielding
Da

Design
ta

Mobile Application
Security Testing systems
ta S

Data Knowledge Cloud event


Text summation SaaS Security
AI engineering observability graphs Threat Intelligence Micro brokers
In Posture Management iPaaS Feature
ecu

Products and Services frontend In


In Deployment Data Security management tools
deployment Bot Management deployment Conversational
Identity Threat Platforms
rit

Causal AI Data-centric AI Customer journey user interfacesa


Detection and Security Code
y

Container analytics
Decision Response (ITDR) Application Security Assistants
Augmented managementa

2024 Strategic Portfolio


Lakehouse Business Email Posture Management
Composite AI intelligence WebAssembly Digital experience
data and analytics Compromise

2024 Technology Adoption


Post-Quantum platforms
(BEC) Protection Software Supply Cryptography

2024 Technology Adoption Roadmap Management Frameworks, Processes


Conversational AI Microservices
Attack Surface Chain Security DesignOps AI-augmented
Generative analytics Augmented data Cloud API security

Roadmap for Midsize Enterprises


Management testing
First principles experience quality solutions Data Security development testing tools
Cloud-Native AI coding

for Infrastructure and Operations (I&O) and Tools Investments Roadmap


Infrastructur

(rename for Hybrid Mesh Zero Trust Already as a Service environments Internal API threat
Application assistants
Already Deployed Low-code Already protection
D eve l o p m e

physics-informed AI) Firewall Platform Strategy developer


A n a ly tic s a n

Active metadata Protection Platforms


Machine learning deployed Small and Software application portals deployed
management Mobile application
wide data Remote Browser API Security Composition
IT leaders from more than 400 midsize enterprises (MSEs) collaboratedContinuous
platforms
to
n

XDR Isolation Analysis Progressive security testinga


I&O leaders should use this research to benchmark their adoption plans for Budget restrictions and talent shortages bring difficulty in identifying
Testing DevSecOps
fi c a ti o

Federated
Security
map the adoption
Innersourcing ofweb50
appstechnologies
tooling according to their
Threat deployment stage,
modeling
compliance
automation a

technologies and practices


machine learning
across operations; cloud, edge and data center;
Deep learning
the right strategic
NDR
portfolio management investments in 2024. Strategic
Service Edge
platforms
enterprise value
AI
and deployment risk.
engineering aMSE CIOs can use this infographic to
automation Security code a
e Se

Programmable
and network and digital workplace. We offer technology data adoption
Augmented
timelines portfolio leaders CSPM
can use this analysis to benchmark their
Privacy investment
Digital business Observability assistants a
Threat Modeling
benchmark their adoption plans with their peers
tools and review key adoption trends.
nt pl

infrastructure
ve r i

catalog technology
d AI

Automation
and riskPrompt
andengineering
value drivers for 52 technologies from 144 of their peers. plans for SPM frameworks, processes and tools against Toolspeers.
Management Software
c ur

Natural language platforms


composition
a t fo

processing
and

Software engineering Policy as


ity

API Access analysisa codea


Digital ethics intelligence platforms
Serverless Control Cloud event
rm

ri t y

Function Security Confidential stream processing


Adaptive machine Green software
sa

Computing engineering
cu

Large-scale pretrained learning ModelOps Prompt Software bill


Journey-Time
isk

Enterprisetechnologies
nd

Value engineeringa Deployment Risk Adoption


of materialsPhase
Se

language model Orchestration


Responsible AI Adoption phase
Enterprise value Deployment risk Adoption phase Enterprise value Deployment risk
R

to

IoT Authentication CPS Security The value factor awarded to each The risk factor awarded to each technology The adoption phase is determined by

To see more, set up a call:


CAEP
cy

technology is based on the AI-augmented


analysis of is based on the analysis of potential risks the current deployment plans for a
ol
e

The value factor awarded to each The risk factor awarded to each technology The adoption phase is determined by The value score for each technology is The risk score for each technology is The adoption phase is determined by
nc

Transformers AI TRiSM value drivers, including increased cost-


software posed, includingGitOps
talent unavailability, high majority of organizations. Technologies
riv

technology is based on the analysis is based on the analysis of potential risks the current deployment plans for a determined by analyzing the value level Machine Identity
determined by analyzing the
FIDO risk level
CIEM the current deployment plans for a
na

reported by respondents planning to use or majority of organizations. Technologies efficiency, improved speed and agility,
engineering or unpredictable costs, cybersecurity risk, placed on the border between phases
of value drivers, including increased Composable
posed, including talent unavailability; high majority of organizations. Technologies Managementreported by respondents planning to OpenID
/P

Edge AI y between phases Chaos


ritmoving
enabled resilience, enhanced employee Serverless
technical incompatibility or architecture are on the cusp of moving into the next
er

cost-efficiency; improved speed and data and


or unpredictable analytics
costs; cybersecurity risk; placed on the border between phases using the technology, taking into account use or using the technology, taking intoConnect placed on the border engineering
uof fPaaS
ov

productivity, and delivery of superior complexity, and inability to switch deployment phase.
agility; enabled resilience and reliability; technical incompatibility or architecture g
are on the cusp of moving into the next increased cost-efficiency, improved speed account potential risks such as talent
Identity
Decentralized ec
are on the cusp into the next tools
enhanced employee productivity; and complexity; and lack of vendor or service deployment phase. y and agility, enabled resilience, enhanced unavailability,
Wallets high or unpredictable deployment
rs phase.
capabilities to consumers. providers due to vendor lock-in.
ad employee productivity, and delivery of
Identity
costs, cybersecurity risk, and technical be
-re
enabled innovation by internal consumers. provider
Generative AIsupport.
Reinforcement Cy OpenTelemetrya
AI
superior capabilities to consumers. incompatibility or architecture complexity.
learning Ide
n tity/
Acces
s Management D e pl on s
p e ra t i
Low Medium High Low
oy m e nt a n d oHigh
Medium
Low Medium High Low Medium High Low Medium High Low Medium High

Key Take-Aways

Schedule Now
Enterprise value Deployment risk Adoption phase Key Take-Aways
Security and Risk Management
The value factor awarded to each technology is The risk factor awarded to each technology
In planning
The adoption phase is determined by In Planning Software Engineering
ork Enhanced
Se
cu
based on the analysis of value drivers, including is based on the analysis of potential risks the current deployment plans for a majority tw rit
Ne y
Internet API Access Control
er and
increased cost-efficiency, improved speed posed, including talent unavailability, high of organizations. Technologies placed on the Security and risk management (SRM) leaders expect some contraction in purchasing
ntemployee border between phases are on the cusp of
Dinext deployment phase. Improving speed and Cloud-Managed
agility is the top motivation for new technology adoption,
ce capabilities power this year. While the majority of SRM leaders (73%) expect their budgets to increase
agility, enabled resilience, enhanced or unpredictable costs, cybersecurity risk, Piloting Security
ta
productivity and delivery of superior technical incompatibility or architecture
moving into the gi a dramatic shift from last year.
Networks Rapidly evolving business
(CMNs) andService
customer
Edge needs are driving
ta in 2024, only about one-fourth Adaptive
of those anticipating budget increases expect increased
da
Endpoint
to consumers. complexity,
AI cloud DaaS
and inability to switch optimization
providers lw portfolio Piloting software engineering leaders to place significant emphasis
Detection and on theZero
speed and agility with
nd
Identity-Based
services Piloting
due to vendor lock-in. tools (DOTs) purchasing power. The remaininggovernance49% expect their budget increases to be nominal and in Trust
Adaptive project which they’re able to deliver new solutions. This explains
Segmentation why improving
Response (EDR) speed and agility
Network Access
line with inflation. Finally, 27% of respondents expect their budgets to decrease in nominal
or
a

(Microsegmentation)
Cloud-tethered management and is the most common value driver reported for this year’s roadmap, with leaders selecting it
ge

kp

PC as a Agile
compute service or real terms. reporting tools
ed

la

beyond IT
ks

as the primary
Networkvalue driver for 47% of the technologies.
Automation This marks a dramatic shift from 12
SASE
ce

Extended
or
d,

BMaaS Security Orchestration,


To

SRM leaders look optimistic about timelines for technology adoption at their organizations. months ago,Edge
when IoT the most common value drivers for technologies
Detection and on the roadmap were
ou

ew

Low Medium High Low Medium High Modular Automation and Response
Multimethodology
o

Software-Defined Response (XDR)


Edge computing devices providing cost efficienciesWAN and(SD-WAN)
delivering superior capabilities. (SOAR) Solutions
Cl

Enterprise Agile Networking


ls

Deployment
Of the 44 emerging technologies covered in our survey, 32% are “in deployment,”
dashboards and 66%
m

es

frameworks Completion
Fra

vic

Distributed DEX tools


Edge stream cloud Unified are “piloting.” Only post-quantum cryptography (PQC) has been reported under the planning
Strategic LCAP 2024
workspaces portfolio In Technical incompatibility/architecture
Digital Experience complexity Network
is currently
Detectionthe greatest concern
Ser

analytics In stage. Interest in PQC is picking up but investment


Deployment is lagging, as these algorithms are still Monitoring and Response (NDR) Low-Code/No-
Edge deployment management associated with new technology deployment for software engineering leaders.
Key take-aways
SMP
functions Cloud under development and lackstandards
standardization. SRM leaders are carefully monitoring its use Code Solutions
tructure and Platform

Desktop as a service
HPC Lean portfolio As technologies
Distributed have proliferated and become inherently complex, new technology
cases and weighing them against the complexity and cost involved. Cloud
Edge servers Unified endpoint security UEM management AI-enabled PPM deployment presents challenges in integrating
Deploymentthem successfully into the existingITSM Platforms
Organizations are taking a Serverless
“pilot and prove” stance to being AI-ready. While Microservices Completion
Digital Workplace

Consumption-
infrastructure Visual collaboration tools
SRM leaders see the key value of their cybersecurity technology investments as reducing environment.
API Technical
Edge incompatibility/architecture
2023 complexity is therefore the
AI has taken the
based world by storm, organizations are still figuring out the optimal
sourcing most citedComputing
Management risk factor, noted
Serverless
by software engineering leaders as the primary
Application Data
risk factor
LPWA
way to leverage and
Multicloud Workplace analytics Remote expert risk exposure. Sixty-eight percent of technologies are being adopted to reduce the Computing Management
Objectembed it as part of their workflows. Of the 36 technologies PaaS
guidance solutions Agile project Strategic portfolio for 43% of the technologies on the roadmap this year.
Cloud-Tethered
Edge
storage Hybrid
Smart meeting room enterprise’s risk exposure. In comparison, 23% are expected to enable
management tools resilience and reliability,
surveyedPaaSin the roadmap thiscloud
computingyear, consistent with thesolution/system
trend last year,
(Smart 75% of PMO/PPM management Compute
Everyday AI
Already video meeting system) particularly those related to identity and access
Alreadymanagement (IAM) and application security.
RPA-enabled Data and Analytics
technologies are being piloted, 22% aredeployed in deployment and 3% are being planned. as a service Deployed Cost
Cloudconsiderations
Infrastructure are becoming less of a factor in software
Cloud MDM engineering leaders’
Governance
APM Container Only four technologies from the total survey sample are valued for their ability to improve
PPM
It is currently projected that all the technologies in deployment are expected to
management technologyand Platform
deployment decisions. In last year’s survey, cost considerations were Unified Endpoint
speed
Adaptiveand agility — cloud-native application protection platforms (CNAPPs), crypto-agility, Services (CIPS) Management
reach
Wi-Fi 6Eadoption by the end of 2024. a clear priority for software OS
engineering leaders as they were cited prevalently, both for
Infras

Network automation
SOAP network detection and response (NDR), and threat modeling automation. However, SRM
program Containers
Observability management the potential value technologies could create by reducing ongoing costs andGenerativefor theAIrisk
This is no doubt going to be challenging; data from the 2023 Gartner
Automated AI in tracing
the
Distributed leaders see that value as potentially being limited by the risk of unpredictable costs. Hyperconverged Data Storage
5G services
Infrastructure incident of high or unpredictable
Infrastructure AI Cloud costs from deploying the technology. That did not hold true
Management
ute

Portfolio- Desktop as
Enterprise
NFV Survey reveals only an average of 48% of AI proofs ofresponse
automation concept (POCs) Software Services
this year. Instead, this year no technology Services
has “providing cost efficiency and savings”
AI for IT Operations
Organizations invest in application and data security
level resource to support the growing adoption
Application a Service
make it into production, and, on average, itDigital
takes 8.2 months to go from POC
mp

Integrative (AIOps) Platforms


experience
monitoring Serverless
Demand
of cloud-native applications.management
portfolio
The volume and velocity of data are growing exponentially, as the primary value factor and Cloud onlyData
11% had “high or unpredictable costs” as the primary
Multicloud ESG tracking Edge Data
to production. Hence, D&A leaders
networkingcurrently find themselves at a challenging management management
risk factor. Management
Co

container Backup
Native cloud driven by the growing number of applications. To make more responsive applications and
inflection point between piloting AI initiatives monitoring
and adopting AI at scale, and the Managed IoT
ZTNA enhance user experiences, more organizations are building digital applications on cloud- Cloud
Services Infrastructure
onus is on D&A leaders and their teams to make a successful transition.Open
Virtual PPM for new Deployment risk has become a more important factor in technology adoption
Analytics as Code plans
(IaC)
support telemetry native platforms. This is pushing them to take measures to secure APIsproduct and app data. Of Container
Continuous Dynamic funding over the past 12 months. Software engineering leaders are exhibiting caution in their
Backup
People are the biggest
agents the 17 technologies aimed at securing applications and data, 35% are in deployment, while
development
SASEconstraint in the people, process and technology
compliance and investment
Human-centric adoption plans for technologies they rate as high risk. Only 29% of
Enterprise high-risk
Robotic Processtechnologies
automation
trifecta associated with AI-readiness. As of last year, respondents cited 44% 59% remain inmodeling
the pilotingDynamic
phase.resource
Organizations expected the remaining technologies Augmented Analytics Automation
change are currently in deployment, a shift
Endpoint from last year
Backup when the high-risk technologies were
under deployment, including application
planning and security posture management and software
of the technologies were plagued by talent unavailability this year as well. It leadership
evenly split between the piloting and deployment phases. Value Stream
ns

AI-enabled log scenario


supply chain security, to be rolledmodeling
out by the end of 2023. St Container
N

w
was identified as the biggestAI roadblock
monitoring
in the adoption of these emerging
io

Management
or
et

networking Value-tracking
or r Management
at

ag Platforms
k
technologies. As per the 2024 Gartner Chief Data and Analytics Officers’ (CDAO) pe SRM Leaders are investing in generative AI (GenAI) to combat GenAI risks. SRM
mechanisms Software engineering
e leaders areNative
Container exploring Continuous
several AI-driven technologies n
io as they
Policy as
Agenda Survey, talent recruitment and retentioncode woes have been among the
O Off-cycle
rationalize thean hype Storage
d D and enthusiasm for these new
Delivery tools against their
(CD) at
mrisks and
leaders ranked GenAI-powered cyber-attacks
portfolio (such as phishing, scams, business email
a uto engineering leaders’

Source: 2024 Gartner Technology Adoption Roadmap for Midsize Enterprises Survey
top 3 challenges for D&A leaders over the past three years. Upskilling current unproven utility. There tabare seven AI-related technologies on software
compromise [BEC] and malware) as reprioritization
their top concern from the growth of GenAI, with the ase IT A
staff with generative AI (GenAI) skills is the main way advanced generative AI adoption roadmaps this year, all of which are currently in the piloting phase. With the
risk of GenAI application or data breaches (such as training data tampering, or attacks
organizations choose to address GenAI talent needs. exception of prompt engineering, leaders rate all of the AI-driven technologies as high risk.
on AI models) second. At least half of thePro167c escompanies
se s surveyed plan to invest in
cybersecurity technologies between 2023 and 2025 to safeguard their GenAI applications.

@ 2025 Gartner, Inc. and/or its affiliates. All rights reserved. CM_GTS_3483939
Speed and agility are the greatest value proposition for being AI-ready. The need to improve developer experience and productivity continues to drive
Related technologies include specialized application security testing tools, prompt security
Respondents perceive that 83% of the technologies that make organizations AI- technology adoption. Improving developer experience or productivity was the second
technology, and privacy-enhancing technologies (such as homomorphic encryption and Keymost
Take-Aways
ready have the potential to enhance speed and agility. As a secondary value factor, common value driver software engineering leaders reported and was associated
Key81%
Take-Aways synthetic data) for GenAI applications. Around 42% of the respondents mentioned that
of the technologies have also been associated with contributing to an increase with 19% of technologies on this year’s roadmap, which is consistent with findings from
Keyinvestment
takeaways was underway for generative AI user interfaces (“virtual assistants”) in existing Cybersecurity
Infrastructure andbusiness
in organizations’ Operations (I&O)this may sound good, 49% of leaders highly
value. While last year.
2024 SPM tools,
security Frameworks, Processes
while 37% give precedence andtoTools Investments
GenAI-powered Roadmap
third-party, supply chain,
involved in AI report that estimating and demonstrating value from AI is their top and vendor risk management platforms.
I&O has increased the pace MSEs lagsecure
Building in adoption of security
software orchestration
engineering solutionsautomation and response
is a high priority, (SOAR)
with leaders
challenge when it comes to AIofimplementation.
technology adoption to respond
As AI becomes to the growing
pervasive within and
Due to the economic headwinds in 2023, strategic portfolio leaders are prioritizing despite earlier
indicating plans to
significant adopt
plans toin 2023.
adopt MSEs
new gain accessintothe
technologies security
securitytechnologies
and verification
changing
the demands
organization, of theirmanagement
AI change customers. Of the 52 technologies
activities surveyed
become all the in the roadmap
more crucial. SRM leaders
smaller pilotsinvest heavily
in 2024 in identity
as opposed infrastructure
to organization protection.
level The increasing
deployments. complexity
More than through
category.relationships
While softwarewithengineering
managed service
leaders providers. They lagplans
report adoption in deploying
across allSOAR due to
categories
this year, 52% are
Organizations thatinperform
deployment
change and 48% are in pilot,
management compared
frequently with 40%
experience of technologies
greater of the threat
two-thirds oflandscape andportfolio
the strategic proliferation of identities
management having
(SPM) access to processes
frameworks, corporate resources SOAR’s high
to support risk levels
delivery and medium
activities, perceived
the security value. In addition,
and verification categorythey
hasare slow number
a high in adopting
of

You might also like