CyCognito Named a Gartner Cool Vendor for CyCognito Platform

By Raphael Reich, Vice President of Marketing | October 22, 2020

Becoming A Gartner Cool Vendor

We think being a Gartner Cool Vendor is not something that comes easily; among other things you cannot apply for it. Cool Vendor research is designed to highlight interesting, new and innovative vendors, products and services. So, we at CyCognito were thrilled to learn that Neil MacDonald, Distinguished VP Analyst, Jie Zhang, VP Analyst, and Elizabeth Kim, Principal Analyst have named as a Gartner Cool Vendor.*

A Solution for Challenging Times

The global pandemic sets the context for this market. In the wake of the COVID-19 pandemic, organizations have been working hard and fast to enable employees to operate from home. That means more VPNs and Remote Access Servers to connect the workforce to company business systems. And, many organizations have started or accelerated digital transformation projects. When you expand your IT ecosystem in these ways, and especially when it happens rapidly, you introduce unseen digital risks. The CyCognito platform keeps that risk under control and reduces the cost of that process.


What makes CyCognito a "Cool Vendor"

Surviving or thriving as a business in a pandemic requires that organizations adapt in many ways, including technology shifts such as enabling remote workforces and accelerating digital transformation initiatives.

In Cool Vendors in Cyber and IT Risk Management, Gartner encourages security and risk management leaders to re-evaluate their operational risk and resilience management processes and vendors.

Click on the video button to hear Raphael Reich, VP of Marketing, discuss what made CyCognito a Gartner Cool Vendor.

Path of Least Resistance - POLaR

The fact is, many organizations currently have unmonitored, unprotected exposures that will provide a convenient “path of least resistance” for attackers. Once discovered, these paths enable attackers to successfully penetrate a network, system or application. Depending on the attacker’s objectives, these externally exposed business resources are at risk of compromise, theft, impairment or manipulation. In this time of fast-paced, dynamic digital business initiatives, areas of “shadow risk” frequently occur, and attackers are adept at finding them while simultaneously alluding most security tools and procedures.

POLaR Attack Surface with Bots
Unknown Unknowns

Security and IT organizations are well aware of the challenges and prevalence of shadow IT by digitally empowered employees, and how these become enmeshed with the company’s own sanctioned IT. Most are still surprised by the actual number of these systems in use, sometimes an order of magnitude greater than what one might have expected. Similarly, the volume of externally accessible assets is almost always far larger than security or IT leaders might surmise.

The majority of security products, programs and procedures, including ongoing security testing and assessments, revolve around known assets and infrastructure. But CISOs and other executives frequently tell us that one thing that keeps them up at night are the unknowns: “What is not monitored or protected? What could be commandeered to undermine security or the business?”

Answering these questions requires an outside-looking-in vantage that needs to be coupled with risk analysis and prioritization so that high-risk, business-critical findings take priority. And, because of the pace of change for most companies, these questions also need to be answered frequently, so having an automated capability that does not require input from an already stretched security team is important. This, in essence, is what we have done with the CyCognito platform and what contributed to this significant recognition.


*Source: Gartner, Cool Vendors in Cyber and IT Risk Management, Jie Zhang, Elizabeth Kim, Neil MacDonald, 1 October 2020.


The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Raphael Reich, Vice President of Marketing

Raphael Reich, Vice President of Marketing, has helped bring innovative, category-defining security products to market for over two decades.

Contact Author:
  • linkedin
  • email

Start Eliminating Your Shadow Risk

Demo Request